Federal Jury Convicts Former Technology Manager Of Computer Hacking Offense (September 8, 2005)
DOJ Seal
September 8, 2005
Department Of Justice
Northern District of California
United States Attorney
Luke Macaulay
11th Floor, Federal Building
450 Golden Gate Avenue, Box 36055
San Francisco, California 94102

Federal Jury Convicts Former Technology Manager Of Computer Hacking Offense

Defendant Found Guilty of Placing Computer “Time Bomb” On Employer’s Network Following Employment Dispute

SAN JOSE — The United States Attorney’s Office for the Northern District of California announced that William Carl Shea, 39, of San Jose, California, the former Program Manager of a Silicon Valley-based debt collection company, was convicted late yesterday afternoon by a federal jury in San Jose of intentionally causing damage to a computer, in violation of 18 U.S.C. §§ 1030(a)(5)(A)(I) & 1030(a)(5)(B)(I) and 1030(c)(4)(A). The jury deliberated for approximately two hours.

According to the indictment and evidence introduced at trial, Mr. Shea placed malicious computer code on the network of the Bay Area Credit Services, Inc. in San Jose that caused the deletion and modification of financial records and disruption of the proper functioning of the computer network. More than 50,000 debtor accounts were ultimately affected by the operation of the code before it was stopped. Testimony at trial indicated that the loss to the company as a result of the defendant’s time bomb exceeded $100,000, though the exact amount has not yet been determined.

Evidence presented at the six-day trial showed that Mr. Shea was hired around August 2001 as a programmer and manager of the company’s specialized financial software computer network. In this position, Mr. Shea had administrative level access to and familiarity with the company’s computer systems, including the database server. After Mr. Shea was advised of adverse employment issues near the end of 2002, he was placed on a performance improvement plan on January 6, 2003. The evidence showed that a “time bomb” was placed onto the company’s network around that time. When the defendant failed to show up at work without any prior notice on January 17, 2003, he was terminated. Company officials did not know at the time that he had placed malicious code on the computer network that was set to delete and modify data at the end of the month.

After the code corrupted financial records, investigators and others traced the access and modification of the time bomb to the defendant. Each point of access was through one of the defendant’s accounts. The malicious code was written to delete the source code but officials eventually found a copy on a backup tape, which further confirmed Mr. Shea’s involvement. Evidence was also presented that Mr. Shea deleted computer records concerning his command history of access to the time bomb.

The maximum statutory penalty resulting from the conviction is five years in prison, a maximum fine of $250,000 or twice the gross gain or loss whichever is greater; a three year term of supervised release; and $100 mandatory special assessment. However, any sentence following conviction would be imposed by the court after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553. United States District Judge Ronald M. Whyte, who presided over the trial, set sentencing for November 21, 2005, at 9:00 a.m. in San Jose.

The prosecution is the result of an investigation by the Federal Bureau of Investigation’s Cyber Crime Squad in Oakland. The investigation was overseen by the Computer Hacking and Intellectual Property (CHIP) Unit of the United States Attorney’s Office for the Northern District of California. Mark L. Krotoski is the Assistant U.S. Attorney from the CHIP Unit who is prosecuting the case.

Further Information:

A copy of this press release and related court filings may be found on the U.S. Attorney’s Office’s website at www.usdoj.gov/usao/can.

Electronic court filings and further procedural and docket information are available at https://ecf.cand.uscourts.gov/ (click on the link for “to retrieve documents from the court”).

Judges’ calendars with schedules for upcoming court hearings can be viewed on the court’s website at www.cand.uscourts.gov.

All press inquiries to the U.S. Attorney's Office should be directed to Assistant U.S. Attorney Christopher P. Sonderby, Chief of the CHIP Unit, at (408) 535-5037, or Luke Macaulay at (415) 436-6757 or by email at Luke.Macaulay3@usdoj.gov.


###

More information: