Menu
US IT pro gets prison time for sabotaging ex-employer's system

US IT pro gets prison time for sabotaging ex-employer's system

Ricky Joe Mitchell must also pay more than $500,000 in restitution and fines

A former network engineer for oil and gas company EnerVest has been sentenced to four years in federal prison after pleading guilty in January to sabotaging the company's systems badly enough to disrupt its business operations for a month.

Ricky Joe Mitchell of Charleston, West Virginia, must also pay US$428,000 in restitution and a $100,000 fine, according to an announcement this week from U.S. Attorney Booth Goodwin's office.

In June 2012, Mitchell found out he was going to be fired from EnerVest and in response he decided to reset the company's servers to their original factory settings. He also disabled cooling equipment for EnerVest's systems and disabled a data-replication process.

Mitchell's actions left EnerVest unable to "fully communicate or conduct business operations" for about 30 days, according to Booth's office. The company also had to spend hundreds of thousands of dollars on data-recovery efforts, and part of the information could not be retrieved.

"Imagine having your company's computer network knocked out for a month," Goodwin said in a statement. "In this day and age, that kind of attack is devastating."

Mitchell's actions cost EnerVest well over $1 million, according to the indictment against him.

Mitchell had faced up to 10 years in prison as well as three years of supervised release, but could serve less than the four years thanks to federal guidelines providing up to 54 days off per year for good behavior.

He's not the only IT professional in recent memory to take revenge on an employer, although Mitchell's actions caused more economic damage than others.

In 2009, a former IT staffer at Baltimore Substance Abuse Systems hacked into a PowerPoint presentation the CEO was giving to a group of city officials, causing porn to suddenly appear on a large screen.

Walter Powell received a two-year suspended sentence and was ordered to perform 100 hours of community service as punishment for the stunt.

Chris Kanaracus covers enterprise software and general technology breaking news for The IDG News Service. Chris' email address is Chris_Kanaracus@idg.com


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags CriminalservicessecuritylegalsoftwareIT managementEnerVestcybercrime

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments