DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Carrell Clinic guard indicted

Posted on July 28, 2009 by Dissent

A federal grand jury in Dallas has returned an indictment charging an Arlington, Texas, man, who worked as a contract security guard at the Carrell Clinic on North Central Expressway in Dallas, with felony offenses related to his compromising and damaging the hospital’s computer system, announced Acting U.S. Attorney James T. Jacks of the Northern District of Texas. Jesse William McGraw, a/k/a “Ghost Exodus,” 25, is charged with two counts of transmitting a malicious code. McGraw has been in custody since his arrest late last month on related charges outlined in a criminal complaint.

The indictment alleges that from April 2009 through June 2009, McGraw transmitted malicious code that caused damage to a computer at the Carrell Clinic that maintained patient medical records, giving him the potential to modify and impair medical exams, diagnoses, treatments or care of individuals. The indictment further alleges that during the same time frame, McGraw transmitted malicious code that caused damage to the HVAC computer that controlled the heating, ventilation and air conditioning at Carrell Clinic, giving him the potential to modify the building’s HVAC system, resulting in the impairment of patient medical exams, diagnoses, or the care of one or more individuals, and threatened public health and safety. Upon McGraw’s arrest, the Carrell Clinic Information Technology staff identified and remedied the numerous compromised computers in the building.

According to the affidavit filed in support of the criminal complaint, McGraw is the leader of the hacker group, “Electronik Tribulation Army.” He was employed as a security guard for United Protection Services, in Dallas, and worked the night shift, from 11:00 p.m. to 7:00 a.m. at the Carrell Clinic hospital. McGraw, who used the online nickname “Ghost Exodus,” posted pictures on the Internet of the compromised HVAC system and videos of himself compromising a computer system in a hospital.

The affidavit further stated that the investigation revealed that McGraw was planning to use his compromised systems to commit additional crimes on or before July 4, 2009, a date that McGraw, according to the affidavit, called “Devil’s Day.” He posted videos on the Internet which included admonitions to other hackers to assist him in conducting unauthorized computer intrusions in support of a “massive DDOS” on July 4, 2009. DDOS is an acronym for Distributed Denial of Service, a type of computer attack in which an unauthorized individual assumes control of other computers and uses the massed ability of those computers, over which they have unauthorized access and control, to attack targeted computers. The investigation also revealed that McGraw recently provided United Protection Services his one week notice and his last day of work was to be July 3, 2009, the day before the scheduled DDOS attack.

An indictment is an accusation by a federal grand jury and a defendant is entitled to the presumption of innocence unless proven guilty. However, if convicted, each count carries a maximum statutory sentence of 10 years in prison, a $250,000 fine and restitution.

Source: U.S. Attorney’s Office, Northern District of Texas

Category: Breach IncidentsHackHealth DataMalwareU.S.

Post navigation

← Two indicted in aggravated id theft
Second member of id theft ring pleads guilty →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report