DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Carrell Clinic guard indicted

Posted on July 28, 2009 by Dissent

A federal grand jury in Dallas has returned an indictment charging an Arlington, Texas, man, who worked as a contract security guard at the Carrell Clinic on North Central Expressway in Dallas, with felony offenses related to his compromising and damaging the hospital’s computer system, announced Acting U.S. Attorney James T. Jacks of the Northern District of Texas. Jesse William McGraw, a/k/a “Ghost Exodus,” 25, is charged with two counts of transmitting a malicious code. McGraw has been in custody since his arrest late last month on related charges outlined in a criminal complaint.

The indictment alleges that from April 2009 through June 2009, McGraw transmitted malicious code that caused damage to a computer at the Carrell Clinic that maintained patient medical records, giving him the potential to modify and impair medical exams, diagnoses, treatments or care of individuals. The indictment further alleges that during the same time frame, McGraw transmitted malicious code that caused damage to the HVAC computer that controlled the heating, ventilation and air conditioning at Carrell Clinic, giving him the potential to modify the building’s HVAC system, resulting in the impairment of patient medical exams, diagnoses, or the care of one or more individuals, and threatened public health and safety. Upon McGraw’s arrest, the Carrell Clinic Information Technology staff identified and remedied the numerous compromised computers in the building.

According to the affidavit filed in support of the criminal complaint, McGraw is the leader of the hacker group, “Electronik Tribulation Army.” He was employed as a security guard for United Protection Services, in Dallas, and worked the night shift, from 11:00 p.m. to 7:00 a.m. at the Carrell Clinic hospital. McGraw, who used the online nickname “Ghost Exodus,” posted pictures on the Internet of the compromised HVAC system and videos of himself compromising a computer system in a hospital.

The affidavit further stated that the investigation revealed that McGraw was planning to use his compromised systems to commit additional crimes on or before July 4, 2009, a date that McGraw, according to the affidavit, called “Devil’s Day.” He posted videos on the Internet which included admonitions to other hackers to assist him in conducting unauthorized computer intrusions in support of a “massive DDOS” on July 4, 2009. DDOS is an acronym for Distributed Denial of Service, a type of computer attack in which an unauthorized individual assumes control of other computers and uses the massed ability of those computers, over which they have unauthorized access and control, to attack targeted computers. The investigation also revealed that McGraw recently provided United Protection Services his one week notice and his last day of work was to be July 3, 2009, the day before the scheduled DDOS attack.

An indictment is an accusation by a federal grand jury and a defendant is entitled to the presumption of innocence unless proven guilty. However, if convicted, each count carries a maximum statutory sentence of 10 years in prison, a $250,000 fine and restitution.

Source: U.S. Attorney’s Office, Northern District of Texas


Related:

  • Arlington Security Guard, Who Hacked into Hospital's Computer System, Pleads Guilty to Federal Charges
  • Justice Department Announces Five Cases as Part of Recently Launched Disruptive Technology Strike Force
  • TX Security Guard Arrested for Hacking Hospital
  • Seven Charged in North Texas as Part of Largest National Medicare Fraud Takedown in History
  • Three North Korean Military Hackers Involved in Sony Pictures Hack, Wanna Cry, and Numerous Other Attacks Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe
Category: Breach IncidentsHackHealth DataMalwareU.S.

Post navigation

← Two indicted in aggravated id theft
Second member of id theft ring pleads guilty →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • HHS’ Office for Civil Rights Settles HIPAA Investigation of MMG Fusion, LLC Breach Affecting 15 Million Individuals
  • NL: Suspects report themselves via new reporting form
  • Nigerian Communication Commission Orders Telecoms to Report Cyber Threats Within 4 Hours
  • Russian Ransomware Administrator Pleads Guilty to Wire Fraud Conspiracy
  • LeakBase seized, arrests made as part of global action
  • Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
  • 1,700 Dutch police officers get reminder not to access files without legitimate purpose
  • Israeli spies ‘hacked every traffic camera in Tehran to plot killing of Iran’s Ayatollah Ali Khamenei’
  • Congress finds data brokers cost consumers tens of billions of dollars
  • Evoke Wellness at Hilliard updates its breach notification

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Allstate must face privacy lawsuit over cellphone tracking of drivers
  • Spain fines FC Barcelona €500,000 for failing biometric data protection assessment
  • Polish doctors jailed for denying woman abortion
  • France’s Highest Administrative Court Upholds CNIL’s Standard On Anonymization
  • Dutch police reminded not to snoop in files without legitimate purpose

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.