Home Minneapolis Press Releases 2009 Blaine Man Sentenced for Intentionally Damaging Former Employer’s Computer System
Info
This is archived material from the Federal Bureau of Investigation (FBI) website. It may contain outdated information and links may no longer function.

Blaine Man Sentenced for Intentionally Damaging Former Employer’s Computer System

U.S. Attorney’s Office May 19, 2009
  • District of Minnesota (612) 664-5600

A 21-year-old Blaine man was sentenced today in federal court for intentionally damaging his former employer’s computer system after being terminated.

On May 19 in Minneapolis, United States District Court Judge Joan Ericksen sentenced David Ernest Everett Jr. to 24 months in prison, two years of supervised release and was ordered to pay $48,770 in restitution on one count of intentional damage to a protected computer. He was charged on Dec. 1, 2008, and pleaded guilty on Jan. 12.

According to Everett’s plea agreement, he was employed from July 2007 through March 18, 2008, by the Wand Corp. as a help-desk employee. Wand Corp. provides point of sale servers for a number of retail companies, including several fast-food restaurants. The servers are used to conduct cash register transactions, and are located within the restaurants. However, each server can be remotely administered by Wand using an Internet-based program.

Everett’s employment with Wand was terminated on March 18 and he was upset by the termination. Everett admitted that on April 9, 2008, he launched a malicious software attack on Wand client servers located in approximately 3,000 restaurants. Everett also admitted that he created three malicious files to perform the attack, which was designed to crash the client servers. Everett launched the attack from his home computer, and was able to install the files on approximately 1,000 client servers.

In the early morning hours of April 10, the servers housed at Wand client facilities throughout the U.S. began to crash immediately after being turned on, and the systems stopped performing expected functions and stopped responding to commands. The server and its systems were completely non-operational.

Wand began an investigation, quickly located the malicious files, and was able to restore service to the client servers. The cost to Wand to investigate and rectify the damage caused by the installation of the malicious files was $48,770.

This case was the result of an investigation by the Federal Bureau of Investigation Cybercrimes Task Force in cooperation with the Wand Corp. and was prosecuted by Assistant U.S. Attorney Timothy Rank.

This content has been reproduced from its original source.