San Francisco Hack: Where Was the Oversight?
UPDATED: Private companies are supposed to follow best practices for internal security. Experts are amazed that San Francisco wasn't doing the same.
If the City of San Francisco were a public corporation and allowed a blunder on par with the recent Terry Childs case, it might find itself facing federal investigation and Mayor Gavin Newsom might be fighting to stay out of jail, experts said.
Security experts contacted by InternetNews.com expressed dismay at the apparent lack of basic best practices in the city's IT department -- practices commonplace in the corporate world that they think may have stopped the debacle from ever happening.
Childs, a 43-year-old computer network administrator for the city's Department of Technology, was arraigned on four counts of computer tampering more than a week ago.
Childs reportedly created a password that gave him exclusive access to the system. When the police demanded the password, he gave them a fake one, and later refused to give the proper password even when threatened with arrest.
At his arraignment, Childs's attorney, Erin Crane, told the San Francisco Chronicle he was prepared to give up the password last week.
Childs finally gave up the password on Monday, July 21, when Mayor Newsom went to the jail himself to meet with Childs and his attorney. Since then, according to Ron Vinson, chief administrative officer and deputy director of the San Francisco Department of Technology, the city has been able to regain full access of FiberWAN and change the passcodes Childs put in place.
Childs is still being held on $5 million bail, a sum his attorney has called "crazy." A spokesperson for District Attorney Kamala Harris declined to comment when contacted by InternetNews.com. Crane did not return repeated messages seeking comment.
Raffael Marty, chief security strategist for security and compliance provider Splunk, said security best practices were clearly not applied to the city systems.
"You don't want to have a single person holding the key to the kingdom," he told InternetNews.com.
"I have heard that he was the focal point for everything, and that's incredibly bad practice to put everything in one person's hand," Marty added. "It seemed no one else had the information he had. There seems to be no emergency planning. What if he was hit by a bus? From a security standpoint, this is horrific."
The sentiment from Gartner security analyst Avivah Litan is "we told you so."
"It just goes to show everything Gartner's been trying to tell its clients is true," Litan said. "You've got to lock down privileged users' activities. You've got to monitor them."
"There isn't sufficient monitoring of employees," she added. "Most want to look the other way when it comes to employee activities, whether it's fraud or malicious activities. They don't want to admit they have a problem, so they don't want to work at solving a problem."
How Childs got away with so much is still unclear. In a Chronicle story, Mayor Newsom said Childs "got a bit maniacal." Vinson declined to comment on that statement, but did say that the city was attempting to implement best practices to prevent such a problem, "however, it appears that he was rebelling against them," he told InternetNews.com
Indeed, while most companies fear the external hacker breaching their walls, employees are often the ones to blame -- whether it's activities by someone like Childs or sloppiness as in cases like TJX, where files containing millions of customer records were breached due to weak security.