Feeds

Sacked Intel geek wreaks terrible revenge

Chip shortages all down to one disaffected geezer?

  • alert
  • submit to reddit

Should you, dear reader, be unceremoniously fired from your comfy job for life, would you feel any animosity to your former employer?

Of course you would.

So when Paul Barton heard the grim reaper tolling the death knell "could you just step into my office, Paul?" thoughts of revenge swam unbidden into his mind.
Paul Douglas Barton, 62 (sixty two? Blimey, he's almost old enough to be on the main board), of Beaverton [Don't even think about it - Ed] was charged with breaking into a computer at Intel's Fab 15 plant in California.

Appearing in US District Court in Portland, Barton pleaded guilty to one count of computer fraud, waiving his rights to a trial and to having a grand jury hear the allegations.

As a senior software engineer for Intel, Barton was responsible for maintaining an automatic tracking system called 'Workstream', which monitors the chip-making process.

Barton used a home computer to access the plant's computer in September 1997 and kept the live connection up and running for several days. On 1 October, Intel fired him for as yet undisclosed reasons and stripped him of his security privileges, but his home computer was still linked to the plant.

The next day, Barton accessed the Workstream system and deleted several files. "He intentionally accessed a protected computer without authorisation, recklessly damaging the program," said Kent Robinson, an assistant U.S. attorney. "This caused the plant to shut down."

The shutdown lasted about four hours, which Intel claimed cost $20,000 to put right.

Barton was released pending sentencing, which is scheduled for 12 September. He faces a maximum of five years in choky and a $250,000 fine. &reg:

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.