Terry Childs played the "battle of wills" game and lost. He's not the innocent child that some are alluding to - he did willfully not give the passwords out.
When I was a corporate IT guy (about 3 years in the middle of about 16 years as a consultant), I took responsibility over a large part of the network in a multi facility health care business. This wasn't life or death stuff, but network outages did cause problems with appointments and general "face" of the corporation. When I came on board, the network was down a lot. No change control, no "chief" in charge of the network, and about 9 people mucking with stuff constantly.
I put my job on the line, in exchange for FULL control of that system (It was a 85 server Netware + Groupwise environment). The first thing I did was take *everyone's* admin away, removed "admin" from supervisory rights to the tree. I then doled out the appropriate levels of access to the security team (read new users, password resetters), put in a hidden OU with a tree supervisor in it and then wrote the "master" admin/login information down. Lightly, in pencil. Folded it up, put it in an envelope with a tamper seal, that went into another tamper evident envelope and that went into the safe. Every month or two I changed the password and replaced the envelope.
That was in case I died, they could easily get in. That is what Terry should have done. Then it wouldn't have come to this - he might have gotten sacked, and/or lost control over what he considered to be his "creation" -- but he wouldn't be rotting in jail....