A while back I was employed by the Computer Operations department of a major California university. It was a simple job. I was responsible for monitoring the nightly backup of the university's AT&T 3b5 unix machine. The 3b5 stored all the campus's important data, primarily student records.
I was trustworthy but not entirely trusted. Although I was responsible enough to maintain the system, run routine tests, parse data for reports, and take the blame for any problems, I was never GIVEN root access to the 3b5. I had to make it for myself.
The 3b5's system clock regularly executed a process called SYSBACKUP. This process spawned a shell and ran a series of commands that needed to be run daily (nightly). For reasons of optimization, I was allowed to experiment with the sequence of these commands. The 3b5 was now under my control.
Because much of the 3b5's data was restricted, the process SYSBACKUP and all processes it ran were done so with root access. Here's what I'd do:
FileNotFound '88