Topic: alright which one of you is the guy who hijacked this network?  (Read 6713 times)

0 Members and 1 Guest are viewing this topic.

Offline knightstorm

  • His Imperial Highness, Norton II, Emperor of the United States and Protector of Mexico
  • Lt. Commander
  • *
  • Posts: 2106

Offline Dracho

  • Global Moderator
  • Rear Admiral
  • *
  • Posts: 18289
  • Gender: Male
Re: alright which one of you is the guy who hijacked this network?
« Reply #1 on: July 16, 2008, 07:14:28 am »
Oh boy.. State Prison isn't a nice place for computer nerds.
The worst enemy of a good plan is the dream of a perfect plan.  - Karl von Clausewitz

Offline Dash Jones

  • Sub-Commander of the Dark Side
  • Captain
  • *
  • Posts: 6477
  • Gender: Male
Re: alright which one of you is the guy who hijacked this network?
« Reply #2 on: July 16, 2008, 03:53:28 pm »
He might go there, but only because the people he worked for were idiots.  Aptly proven by his ability to lock them out of their own system, and outsmart their smartest computer techs for more than hours to days.  They need better computer people, and I think he just proved how inadequete everyone else was at the computer arena, and how reliant they were upon him.  Perhaps they should offer him out and a raise.

Oh, and resolve their issues with what appears to be his problem with authority.
"All hominins are hominids, but not all hominids are hominins."


"Is this a Christian perspective?

Now where in the Bible does it say if someone does something stupid you should shoot them in the face?"

-------

We have whale farms in Jersey.   They're called McDonald's.

There is no "I" in team. There are two "I"s in Vin Diesel. screw you, team.

Offline Dracho

  • Global Moderator
  • Rear Admiral
  • *
  • Posts: 18289
  • Gender: Male
Re: alright which one of you is the guy who hijacked this network?
« Reply #3 on: July 16, 2008, 04:10:28 pm »
He might go there, but only because the people he worked for were idiots.  Aptly proven by his ability to lock them out of their own system, and outsmart their smartest computer techs for more than hours to days.  They need better computer people, and I think he just proved how inadequete everyone else was at the computer arena, and how reliant they were upon him.  Perhaps they should offer him out and a raise.

Oh, and resolve their issues with what appears to be his problem with authority.

I love when hackers use the "but they should have been able to keep me out of it if the security was properly implemented" line of reasoning.  It's no different than saying "If the stupid old b*tch had been wearing a Kevlar vest she wouldn't have died when I shot her in the chest and took her social security check".

The guy intentionally committed a felony, and against government property at that.  Someone is going to trade access to his orifices to other inmates for cigarettes and he'll understand the difference between reasonable, lawful authority, and being owned like a cheap blow-up doll.
The worst enemy of a good plan is the dream of a perfect plan.  - Karl von Clausewitz

Offline toasty0

  • Application.Quit();
  • Captain
  • *
  • Posts: 8045
  • Gender: Male
Re: alright which one of you is the guy who hijacked this network?
« Reply #4 on: July 17, 2008, 12:21:16 am »
Saw in the news today that he is still getting paid.
MCTS: SQL Server 2005 | MCP: Windows Server 2003 | MCTS: Microsoft Certified Technology Specialist | MCT: Microsoft Certified Trainer | MOS: Microsoft Office Specialist 2003 | VSP: VMware Sales Professional | MCTS: Vista

Offline Nemesis

  • Captain Kayn
  • Global Moderator
  • Commodore
  • *
  • Posts: 13067
Re: alright which one of you is the guy who hijacked this network?
« Reply #5 on: July 17, 2008, 06:44:46 am »
Saw in the news today that he is still getting paid.

That can happen, at times until the actual conviction.  Apparently his "case" is up for review within the organization and then there will be a decision whether to place him on "unpaid leave" pending his trial or leave it with him being paid.   It can be cheaper than the lawsuit for "unjust dismissal" and backwages just to pay him until convicted and if found not guilty to reinstate him without worrying about another lawsuit.

He does have a prior felony record which he did disclose before being hired.
Do unto others as Frey has done unto you.
Seti Team    Free Software
I believe truth and principle do matter. If you have to sacrifice them to get the results you want, then the results aren't worth it.
 FoaS_XC : "Take great pains to distinguish a criticism vs. an attack. A person reading a post should never be able to confuse the two."

Offline Centurus

  • Old Mad Man Making Ship Again....Kinda?
  • Captain
  • *
  • Posts: 8505
  • Gender: Male
Re: alright which one of you is the guy who hijacked this network?
« Reply #6 on: July 17, 2008, 08:06:52 am »
He does have a prior felony record which he did disclose before being hired.

Kinda makes you wonder which party is the dumber, the guy for screwing around and basically hacking a government network and also possibly continuing to do so while in custody, or the idiots that hired him knowing he was convicted on 4 felony charges. 

The pen is truly mightier than the sword.  And considerably easier to write with.

Offline Nemesis

  • Captain Kayn
  • Global Moderator
  • Commodore
  • *
  • Posts: 13067
Re: alright which one of you is the guy who hijacked this network?
« Reply #7 on: July 25, 2008, 06:25:16 pm »
Link to full article

Quote
The office of San Francisco District Attorney Kamala Harris has made public close to 150 usernames and passwords used by various departments to connect to the city's virtual private network. The passwords were filed this week as Exhibit A in a court document arguing against a reduction in $5 million bail in the case of Terry Childs, who is accused of holding the city's network hostage by refusing to give up administrative networking passwords. Childs was arrested July 12 on charges of computer tampering and is being held in the county jail.


Quote
The passwords, discovered on Childs' computer, pose an "imminent threat" to the city's computer network, according to the court filing. Childs could use the names and passwords to "impersonate any of the legitimate users in the City by using their password to gain access to the system," the motion against the bail reduction states.


Question for the DAs office.  If these passwords and IDs were dangerous in the hands of one man how are they less dangerous PUBLISHED so that every hacker or person with a grudge can access those accounts???

This was data that if needed to be in the court record should have been entered as SEALED for good and valid reasons.  Morons.
Do unto others as Frey has done unto you.
Seti Team    Free Software
I believe truth and principle do matter. If you have to sacrifice them to get the results you want, then the results aren't worth it.
 FoaS_XC : "Take great pains to distinguish a criticism vs. an attack. A person reading a post should never be able to confuse the two."

Offline toasty0

  • Application.Quit();
  • Captain
  • *
  • Posts: 8045
  • Gender: Male
Re: alright which one of you is the guy who hijacked this network?
« Reply #8 on: July 25, 2008, 08:17:28 pm »
Link to full article

Quote
The office of San Francisco District Attorney Kamala Harris has made public close to 150 usernames and passwords used by various departments to connect to the city's virtual private network. The passwords were filed this week as Exhibit A in a court document arguing against a reduction in $5 million bail in the case of Terry Childs, who is accused of holding the city's network hostage by refusing to give up administrative networking passwords. Childs was arrested July 12 on charges of computer tampering and is being held in the county jail.


Quote
The passwords, discovered on Childs' computer, pose an "imminent threat" to the city's computer network, according to the court filing. Childs could use the names and passwords to "impersonate any of the legitimate users in the City by using their password to gain access to the system," the motion against the bail reduction states.


Question for the DAs office.  If these passwords and IDs were dangerous in the hands of one man how are they less dangerous PUBLISHED so that every hacker or person with a grudge can access those accounts???

This was data that if needed to be in the court record should have been entered as SEALED for good and valid reasons.  Morons.


Which is Child's whole point.
MCTS: SQL Server 2005 | MCP: Windows Server 2003 | MCTS: Microsoft Certified Technology Specialist | MCT: Microsoft Certified Trainer | MOS: Microsoft Office Specialist 2003 | VSP: VMware Sales Professional | MCTS: Vista

Offline knightstorm

  • His Imperial Highness, Norton II, Emperor of the United States and Protector of Mexico
  • Lt. Commander
  • *
  • Posts: 2106
Re: alright which one of you is the guy who hijacked this network?
« Reply #9 on: July 26, 2008, 07:54:56 pm »
Link to full article

Quote
The office of San Francisco District Attorney Kamala Harris has made public close to 150 usernames and passwords used by various departments to connect to the city's virtual private network. The passwords were filed this week as Exhibit A in a court document arguing against a reduction in $5 million bail in the case of Terry Childs, who is accused of holding the city's network hostage by refusing to give up administrative networking passwords. Childs was arrested July 12 on charges of computer tampering and is being held in the county jail.


Quote
The passwords, discovered on Childs' computer, pose an "imminent threat" to the city's computer network, according to the court filing. Childs could use the names and passwords to "impersonate any of the legitimate users in the City by using their password to gain access to the system," the motion against the bail reduction states.


Question for the DAs office.  If these passwords and IDs were dangerous in the hands of one man how are they less dangerous PUBLISHED so that every hacker or person with a grudge can access those accounts???

This was data that if needed to be in the court record should have been entered as SEALED for good and valid reasons.  Morons.


You're assuming that they didn't change all of the passwords when they got the network back.

Offline toasty0

  • Application.Quit();
  • Captain
  • *
  • Posts: 8045
  • Gender: Male
Re: alright which one of you is the guy who hijacked this network?
« Reply #10 on: July 26, 2008, 08:21:32 pm »
Link to full article

Quote
The office of San Francisco District Attorney Kamala Harris has made public close to 150 usernames and passwords used by various departments to connect to the city's virtual private network. The passwords were filed this week as Exhibit A in a court document arguing against a reduction in $5 million bail in the case of Terry Childs, who is accused of holding the city's network hostage by refusing to give up administrative networking passwords. Childs was arrested July 12 on charges of computer tampering and is being held in the county jail.


Quote
The passwords, discovered on Childs' computer, pose an "imminent threat" to the city's computer network, according to the court filing. Childs could use the names and passwords to "impersonate any of the legitimate users in the City by using their password to gain access to the system," the motion against the bail reduction states.


Question for the DAs office.  If these passwords and IDs were dangerous in the hands of one man how are they less dangerous PUBLISHED so that every hacker or person with a grudge can access those accounts???

This was data that if needed to be in the court record should have been entered as SEALED for good and valid reasons.  Morons.


You're assuming that they didn't change all of the passwords when they got the network back.


No we're not.
MCTS: SQL Server 2005 | MCP: Windows Server 2003 | MCTS: Microsoft Certified Technology Specialist | MCT: Microsoft Certified Trainer | MOS: Microsoft Office Specialist 2003 | VSP: VMware Sales Professional | MCTS: Vista

Offline Don Karnage

  • Lt. Commander
  • *
  • Posts: 2327
  • Gender: Male
Re: alright which one of you is the guy who hijacked this network?
« Reply #11 on: July 26, 2008, 08:51:35 pm »
if he can do that to the gov computer then they must hire him for better security instead of putting him in jail.

and who hire him for the job?

how many computer are vulnerable to a hacker and could be really dangerous?

Offline knightstorm

  • His Imperial Highness, Norton II, Emperor of the United States and Protector of Mexico
  • Lt. Commander
  • *
  • Posts: 2106
Re: alright which one of you is the guy who hijacked this network?
« Reply #12 on: July 26, 2008, 08:54:38 pm »
Link to full article

Quote
The office of San Francisco District Attorney Kamala Harris has made public close to 150 usernames and passwords used by various departments to connect to the city's virtual private network. The passwords were filed this week as Exhibit A in a court document arguing against a reduction in $5 million bail in the case of Terry Childs, who is accused of holding the city's network hostage by refusing to give up administrative networking passwords. Childs was arrested July 12 on charges of computer tampering and is being held in the county jail.


Quote
The passwords, discovered on Childs' computer, pose an "imminent threat" to the city's computer network, according to the court filing. Childs could use the names and passwords to "impersonate any of the legitimate users in the City by using their password to gain access to the system," the motion against the bail reduction states.


Question for the DAs office.  If these passwords and IDs were dangerous in the hands of one man how are they less dangerous PUBLISHED so that every hacker or person with a grudge can access those accounts???

This was data that if needed to be in the court record should have been entered as SEALED for good and valid reasons.  Morons.


You're assuming that they didn't change all of the passwords when they got the network back.


No we're not.


Nemesis is stating his belief that publishing the passwords which were on his computer is stupid.  That would be the case, unless they changed them before publishing them which is likely.

Offline toasty0

  • Application.Quit();
  • Captain
  • *
  • Posts: 8045
  • Gender: Male
Re: alright which one of you is the guy who hijacked this network?
« Reply #13 on: July 26, 2008, 09:41:46 pm »
Link to full article

Quote
The office of San Francisco District Attorney Kamala Harris has made public close to 150 usernames and passwords used by various departments to connect to the city's virtual private network. The passwords were filed this week as Exhibit A in a court document arguing against a reduction in $5 million bail in the case of Terry Childs, who is accused of holding the city's network hostage by refusing to give up administrative networking passwords. Childs was arrested July 12 on charges of computer tampering and is being held in the county jail.


Quote
The passwords, discovered on Childs' computer, pose an "imminent threat" to the city's computer network, according to the court filing. Childs could use the names and passwords to "impersonate any of the legitimate users in the City by using their password to gain access to the system," the motion against the bail reduction states.


Question for the DAs office.  If these passwords and IDs were dangerous in the hands of one man how are they less dangerous PUBLISHED so that every hacker or person with a grudge can access those accounts???

This was data that if needed to be in the court record should have been entered as SEALED for good and valid reasons.  Morons.


You're assuming that they didn't change all of the passwords when they got the network back.


No we're not.


Nemesis is stating his belief that publishing the passwords which were on his computer is stupid.  That would be the case, unless they changed them before publishing them which is likely.


I understand all that. What I'm saying is that publishing them is stupid even if they did change them before releasing them.

A thorough hacker will sus a pattern...

MCTS: SQL Server 2005 | MCP: Windows Server 2003 | MCTS: Microsoft Certified Technology Specialist | MCT: Microsoft Certified Trainer | MOS: Microsoft Office Specialist 2003 | VSP: VMware Sales Professional | MCTS: Vista

Offline toasty0

  • Application.Quit();
  • Captain
  • *
  • Posts: 8045
  • Gender: Male
Geeks gone wild: Disgruntled IT staff wreak havoc
« Reply #14 on: July 31, 2008, 02:32:50 pm »
REBECCA DUBE

From Monday's Globe and Mail

July 21, 2008 at 3:30 AM EDT

If the phrase "disgruntled computer engineer" didn't send chills down your spine before, the tale of Terry Childs may change that.

The San Francisco city employee allegedly locked everyone but himself out of the city's computer network and refused to give up the password - even to the police.

The computer network still works, but no one can get into it to make changes or repairs, and no one knows how long it will take to restore access.

Mr. Childs was arrested on July 13 and has been sitting in jail, his bail set at $5-million (U.S.), while city officials frantically try to regain control over the system that controls city e-mails, law-enforcement records and payroll documents.

His lawyer insists it's all a misunderstanding, but San Francisco Mayor Gavin Newsom says it's a case of a good employee gone bad.

"He was very good at what he did and sometimes that goes to people's heads," Mr. Newsom told reporters, "and we think that's what this is about."

Mr. Childs, hired five years ago, was highly regarded and even helped build the system he is now accused of holding hostage.

The San Francisco Chronicle reported that Mr. Childs had been disciplined in recent months for poor performance and his supervisors had tried to fire him. Mr. Newsom described him as a "rogue employee that got a bit maniacal."

Maniacal, perhaps, but we all go a little mad sometimes at work. Few of us pull off our revenge in such a spectacular manner as Mr. Childs allegedly did, but still - everyone gets in their little digs at The Man.

"Most of us just steal a few stamps," says John Challenger, chief executive officer of Chicago-based human resources firm Challenger Gray & Christmas.

"All of us have a love-hate relationship with our employers. Everyone feels they're underpaid, underappreciated, blocked, betrayed in one way or another at times."

Mr. Childs entered a plea of not guilty last Thursday. As his story spread around the globe, reactions included a surprising amount of support.

"Go Terry! Take a stand for all the IT personnel being abused by management in this world - I'm with ya!" wrote one online reader of The Times of London.

"You would not give a toddler the keys to your car, so why should Terry give the passwords to staff or bosses who simply don't know how to manage the configs?" asked one Chronicle reader who claimed to have worked with Mr. Childs.

If nothing else, San Francisco's plight should reinforce a key lesson: Be nice to the people who control your computer networks. Sure, they may look harmless, but that's just their Bruce Banner side. Don't make them angry.

"Many companies don't realize how under the thumb of IT [information technology] they really are," Mr. Challenger says.

Mark Swartz witnessed the wrath of a ticked-off techie at a company he worked for in the 1990s. The sole IT person doled out technical assistance based on her whims, and everyone in the office sucked up accordingly.

"She just kept getting meaner, and they couldn't fire her because she was the only person who knew the system," says Mr. Swartz, who is now a career coach and author based in Toronto.

Low-level, passive-aggressive sabotage at work is common, Mr. Swartz says, and only rarely flares into overt acts of retribution for real or imagined slights.

"The more fed up you are, the more likely you are to do something risky," he says.

Those IT folks are not always angels when they wield the power that comes with having access to a company's computer system. One-third of IT professionals admitted to reading personal e-mails, checking salary details and peeking at other confidential information on their networks, according to a survey released last month by IT security firm Cyber-Ark.

"It happens probably more than we're willing to acknowledge," says Adam Bosnian, a vice-president at Cyber-Ark. Executives worry about hacker attacks from the outside, while the greatest risk to their computer networks may be stewing in the next cubicle.

"The top lesson is: Don't assume you have control over your network."

Revenge of the nerds

Oh, those lovable IT folks. We depend on them to keep our computers running, to retrieve our bacon when we mistakenly delete files, and to ignore embarrassing e-mails. But when techies go bad, things can get ugly: An Australian engineer was sentenced to two years in prison for hacking into a waste-management system and causing millions of litres of raw sewage to be dumped into rivers and parks. Vitek Boden had been rejected for a job by a local agency that had contracted the company he worked for to create the computerized sewage system.

Roger Duronio was found guilty of computer sabotage and securities fraud for writing, planting and disseminating malicious code - known as a "logic bomb" - that took down 2,000 of UBS PaineWebber's servers. Mr. Duronio, who quit UBS PaineWebber after getting a smaller-than-expected bonus, had shorted the company's stock on the day the "bomb" was set to go off.

When Danielle Duann was fired from her job as IT director of the LifeGift donation centre in Houston in 2005, she allegedly deleted records containing organ donor information. She was indicted last month.

Soon after Alan Giang Tran was fired from his job at an airport limousine company, his former employer's network was hacked and the customer database wiped out. When federal investigators searched his home, they found details of the company's computer system in a folder labelled "retaliation." He pleaded guilty.

MCTS: SQL Server 2005 | MCP: Windows Server 2003 | MCTS: Microsoft Certified Technology Specialist | MCT: Microsoft Certified Trainer | MOS: Microsoft Office Specialist 2003 | VSP: VMware Sales Professional | MCTS: Vista

Offline FRA.E.Kehakoul_XC

  • Administrator
  • Lt. Commander
  • *
  • Posts: 1100
  • Gender: Male
Re: Geeks gone wild: Disgruntled IT staff wreak havoc
« Reply #15 on: July 31, 2008, 02:48:09 pm »
Double post topic is already covered here,..

http://www.dynaverse.net/forum/index.php/topic,163381598.0.html
FRA.E.Kehakoul_XC

Director - Diplomatic Division

Offline toasty0

  • Application.Quit();
  • Captain
  • *
  • Posts: 8045
  • Gender: Male
Re: Geeks gone wild: Disgruntled IT staff wreak havoc
« Reply #16 on: July 31, 2008, 03:06:21 pm »
Different article. Deals with other IT folks running amok. :)
MCTS: SQL Server 2005 | MCP: Windows Server 2003 | MCTS: Microsoft Certified Technology Specialist | MCT: Microsoft Certified Trainer | MOS: Microsoft Office Specialist 2003 | VSP: VMware Sales Professional | MCTS: Vista

Offline Nemesis

  • Captain Kayn
  • Global Moderator
  • Commodore
  • *
  • Posts: 13067
Re: alright which one of you is the guy who hijacked this network?
« Reply #17 on: July 31, 2008, 03:16:54 pm »
Nemesis is stating his belief that publishing the passwords which were on his computer is stupid.  That would be the case, unless they changed them before publishing them which is likely.

Even if they change the password the USER NAMES are likely unchanged.  Not only does that give them an attack point to use password breaking tools on.  It also lets them know which of those users routinely uses weak passwords.  There is a good chance that one or more of them will revert to the SAME revealed password in the future.  It leaves the job of hacking into user accounts half done or more.
Do unto others as Frey has done unto you.
Seti Team    Free Software
I believe truth and principle do matter. If you have to sacrifice them to get the results you want, then the results aren't worth it.
 FoaS_XC : "Take great pains to distinguish a criticism vs. an attack. A person reading a post should never be able to confuse the two."

Offline FRA.E.Kehakoul_XC

  • Administrator
  • Lt. Commander
  • *
  • Posts: 1100
  • Gender: Male
Re: Geeks gone wild: Disgruntled IT staff wreak havoc
« Reply #18 on: July 31, 2008, 03:39:49 pm »
Well ok ,but its still 80% about Terry,.. would have been a god follow up post,.. dont make a new thread for this!
FRA.E.Kehakoul_XC

Director - Diplomatic Division

Offline toasty0

  • Application.Quit();
  • Captain
  • *
  • Posts: 8045
  • Gender: Male
Re: alright which one of you is the guy who hijacked this network?
« Reply #19 on: July 31, 2008, 04:07:31 pm »
Nemesis is stating his belief that publishing the passwords which were on his computer is stupid.  That would be the case, unless they changed them before publishing them which is likely.

Even if they change the password the USER NAMES are likely unchanged.  Not only does that give them an attack point to use password breaking tools on.  It also lets them know which of those users routinely uses weak passwords.  There is a good chance that one or more of them will revert to the SAME revealed password in the future.  It leaves the job of hacking into user accounts half done or more.
exactly.

But even worse is the fact that publishing also reveals your obfuscation scheme for the PW itself. So, now you have revealed two parts to a 3 part puzzle.
MCTS: SQL Server 2005 | MCP: Windows Server 2003 | MCTS: Microsoft Certified Technology Specialist | MCT: Microsoft Certified Trainer | MOS: Microsoft Office Specialist 2003 | VSP: VMware Sales Professional | MCTS: Vista