Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Suspect In Hijacking Of San Francisco Computer Network 'Willing To Cooperate'

The lawyer for Terry Childs, who has pleaded not guilty, said his client is willing to hand over the password to the city's computer network.

A computer engineer accused of taking control of San Francisco's network and locking out other system administrators has pleaded innocent to four counts of computer tampering.

Terry Childs, 43, of Pittsburg, Calif., was arraigned on charges Thursday before Superior Court Judge Paul Alvarado, the San Francisco Chronicle reported. He remained in jail Friday on $5 million bail.

Childs has refused to disclose the password he allegedly created to lock out other system administrators and supervisors from the city's new FiberWAN (wide area network), which stores 60% of all city government data, including e-mails, law enforcement records, and payroll documents.

However, Childs' court-appointed lawyer Erin Crane said after the arraignment that the case was a big misunderstanding and that the suspect has "been willing to hand over the password since Tuesday," the Chronicle reported. Crane said Childs is "willing to cooperate. We have negotiations ongoing."

Officials with the city Technology Department told the newspaper they were unaware of any offer to hand over the password, and a spokeswoman for District Attorney Kamala Harris refused to comment on any talks between the suspect and prosecutors.

Childs, a member of the team of engineers that built the city's computer system, was highly regarded in the Technology Department. The events leading up to his arrest on Sunday started June 20 when he started taking photographs of the agency's new head of security after she began an audit of who had password access to the system, the newspaper said. Childs' frightening behavior prompted the woman to lock herself in an office.

His supervisors' concerns grew when they discovered he had given himself exclusive access to the system and had developed a way to spy on his bosses' e-mails related to his conduct. Childs was ordered to leave work July 9 for alleged insubordination.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-05
The Lever PDF Embedder plugin 4.4 for WordPress does not block the distribution of polyglot PDF documents that are valid JAR archives.
PUBLISHED: 2019-12-05
D-Link DAP-1860 devices before v1.04b03 Beta allow arbitrary remote code execution as root without authentication via shell metacharacters within an HNAP_AUTH HTTP header.
PUBLISHED: 2019-12-05
D-Link DAP-1860 devices before v1.04b03 Beta allow access to administrator functions without authentication via the HNAP_AUTH header timestamp value. In HTTP requests, part of the HNAP_AUTH header is the timestamp used to determine the time when the user sent the request. If this value is equal to t...
PUBLISHED: 2019-12-05
GitBook through 2.6.9 allows XSS via a local .md file.
PUBLISHED: 2019-12-05
In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote at...