Feeds

Duo deny LA traffic hack charges

The Hollywood Job

The Essential Guide to IT Transformation

A pair of Los Angeles traffic system engineers have been charged with manipulating traffic signals to disrupt transportation across the city in the run-up to a union protest last August.

Gabriel Murillo, 37 and Kartik Patel, 34, were each charged with one count of unauthorized access of a computer. Mutillo also faces an identity theft charge while Patel has been accused of four disruption of service offences. Prosecutors alleged the pair, engineers at in LA's Automated Traffic Surveillance Center, used purloined supervisor credentials to send commands to reprogram signal control boxes at four critical intersections.

Murillo allegedly accessed codes so that only he and Patel could make changes to the system, blocking other workers from sorting out the escalating chaos. The hack succeeded despite plans by managers to temporarily prevent any engineers making changes to the city's traffic control systems.

In a scenario reminiscent of the hack performed in the classic crime flick The Italian Job, the duo allegedly made changes that meant the light stayed at red for a long time on congested approaches, creating huge traffic jams in the process. Traffic was affected at four intersections - Sky Way and World Way near LAX airport, a major junction in Studio City, a spot in Little Tokyo and near the LA Civic Center, the LA Times reports.

Although no accidents were reported it took four days to bring systems back to normal.

The attack occurred hours before a job action by members of the Engineers and Architects Association. Jane Robison of the District Attorney's Office described the timing of the disruption as "more than a coincidence," CBS reports. It's unclear whether or not Murillo and Patel are members of the union but that's beside the point, according to prosecutors.

"This amounts to sabotage and is not to be tolerated no matter what the dispute or cause," said District Attorney Steve Cooley.

Murillo and Patel were charged by the D.A.’s newly formed high tech crimes division on Friday following an investigation by the LAPD's Computer Crimes Unit. Both men denied the charges at a hearing on Monday and were released on bail, the LA Times adds. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.