SlideShare a Scribd company logo
METHODS TO STOP DIFFERENT CYBER CRIMES
1
Methods to Stop Different Cyber Crimes
People must be well-informed regarding internet scams and
certain vulnerabilities, which permit them to occur sooner or
later. With education, they will be in a situation to help in
prevention of such scams successfully (Hynson, 2012). It is
imperative for people to be familiar with attempts of
cybercrimes and to comprehend correct solutions in internet
practices and solutions. People will learn with education how
to put into practice proper security protocols. When they
develop into social media savvy people and when they learn
how to safe guard their computer devices, cybercriminals will
encounter multiple layers of security, which will limit their
illegal activities substantially.
Firewalls have the capability to protect users and their network
devices against cyber criminals in the first instance of a
attempted breach (Lehto,2013). A firewall monitors the
interchange between a local network or the internet and a user’s
computer. The firewall should be enabled through the security
software or a router. Cybercriminals will be unable to use the
interchange traffic to install malware, which is intended to
compromise the user’s network and computer. If more people
would use firewalls, hackers would be at a chief disadvantage
due to being unable to navigate deeper into a system to obtain
sensitive information and eventually, cybercrime would be
lessened for a time.
Users need to analyze their operating and online systems
continually so they can resolve vulnerabilities (Hynson, 2012).
Internal accounting information or protocols, which lead to
financial information or bank statements, should be checked on
a regular basis in order to recognize the risks and mitigate them
accordingly. It is very difficult for people to curb the flow of
cybercrimes if they are ignorant of the risks in which they face
or the weaknesses, which exist within their systems.
One successful way of slowing the actions of cyber criminals is
by acting like them. This requires law enforcement agencies
such as the Federal Bureau of Investigation (FBI) to assign
special undercover agents to gain access to clubs or groups of
cyber criminals so they can investigate their steps (Hynson,
2012). The investigation method will become more effective by
identifying the source of the problem and in developing a
stronger strategy to cripple the efforts of the criminals.
Cyber criminals can hack into systems without difficulty when
they encounter uncomplicated passwords. Users should use
passwords with at least 10 or more characters so they can
amplify the complexity of logging into the computer system
(Lehto, 2013). It also helps top add in capital letters and special
characters to increase the complexity of a password. In
addition, different accounts should have dissimilar ID’s or
password combinations to avoid giving hackers access to all of
your accounts. The complex passwords should also be changed
on a regular basis so criminals cannot find any type of
consistency in information.
Cross-domain solutions involve different organizations and law
enforcement agencies, which have a combined system ensuring
all cyber activities, are monitored continually (Hynson, 2012).
The verification of automatic and manual access or transfer of
information is authenticated through the hardware and software
of the system for different levels of security classification.
Accessing a variety of domains will be very complicated for
cyber criminals while users can get hold of the information they
require with no trouble.
References
Hynson, C. (2012). Cybercrime. Mankato, Minn: Smart Apple
Media.
Lehto, M. (2013). The Cyberspace Threats and Cyber Security
Objectives in the Cyber Security Strategies. International
Journal of Cyber Warfare and Terrorism (ijcwt), 3(3), 1-18.
VENGEFUL EMPLOYEE2
VENGEFUL EMPLOYEE5
Vengeful Employee
John Stahlschmidt
Grantham University
Running head: VENGEFUL EMPLOYEE 1
Vengeful Employee
Michael Menese a 43-year-old computer programmer used to
reside in Smithtown, Long Island, who was employed with
Spellman high voltage electronic corporation. Spellman
founded in 1947 a company who is a provider of direct current
and precision high voltage power supplies for the medical,
industrial, and scientific communities ("About Us," 2015, p. 1).
Menese worked for this company from May 2008 until January
2015. He left the company after being passed over for
promotion multiple times and became upset with the company
(Secret, 2013, p. 1). His specialty working for the company
was in software programming and systems manager specializing
in developing and customizing software, which the company
used to run its day to day business operations ("Long Island
Software Programmer Arrested for Hacking into Network of
High-Voltage Power Manufacturer," 2013, p. 1).
He was one of two employees who primarily were
responsible for the company’s software running, production
planning, purchasing, and inventory control, giving him a high
access level to the company’s computer network. After giving
his two-week notice Menese, decided to start a vengeance
campaign against the company. Before his access was removed
he installed a program to capture employee’s user login and
passwords. Using this information and the security credential
of at least one former co-worker, he would remotely connect
into the company’s network by using a virtual private network
(VPN) from his home and a hotel near his new employer’s
location.
Soon employees at the company noticed things were
happening with the computer system, which they felt were out
of the ordinary. They were unable to process routine
transactions, receiving error messages instead. Menese bent on
revenge against his former company, exploited his access and
technical knowledge to wage a sabotage campaign against his
former company. He altered the business calendar by a month,
disrupting production and finance operations. Due to this the
company suffered over 90,000 dollars in losses because of
Menese’s intrusions into the system. He also accessed the email
from his former supervisor and would use a separate email
account to send messages to potential candidates for his job not
to accept any job offers from the company (Pickard, 2015, p. 1).
The Company logged a complaint alleging, the defendant
engaged in a 21st Century campaign of cyber-vandalism and
high-tech revenge, hacking into the computer network of the
company Mr. Menese’s former employer to disrupt its
operations, thereby causing tens of thousands of dollars in
damage. United States Attorney Lynch stated “We will hold
accountable any individual who victimizes others by exploiting
computer network vulnerabilities ("Long Island Software
Programmer Arrested for Hacking into Network of High-
Voltage Power Manufacturer," 2013, p. 1).”
Menese was caught 2 May 2013 by investigators who
traced the email account to warn off potential candidates for his
old job. One place it was traced to was an Internet protocol
address, which belonged to Menese new employer. They traced
the calendar changes to a hotel in North Carolina, which
happened to be a very short distance away from Mr. Menese
new job. Checking the hotel records the investigators found
Menese to be staying in the hotel at the time of the cyber
attacks. At the time he was caught, Menese pleaded not guilty.
On 6 March 2015 in the federal courthouse in New York,
Michael Menese pleaded guilty to hacking into his former
company’s computer network. The items brought before the
court in which Mr. Menese did where: The defendant deleted a
line of code in a software program that the victim company used
to calculate work order costs, leading the company to
incorrectly calculate these costs, The defendant remotely
accessed the victim company’s network, read an e-mail sent by
his former supervisor to one of his former colleagues about a
candidate for the defendant’s former position, created the e-mail
address [email protected],” and sent the candidate a message
that stated, “Don’t accept any position from [the victim
company],” the defendant gained unauthorized access to the
victim company’s network and modified a database so it would
appear to be March 2012 rather than February 2012. As a result,
the company was unable to process routine transactions, and the
defendant remotely accessed the victim company’s network and
manually purged a purchase order table, which prevented the
company from converting purchase requisitions to purchase
orders ("FBI," 2015, p. 1)
With the guilty plea Mr. Menese will be charged on 7 July
2015. Mr. Menese will be facing up to 10 years in a federal
prison, as well as a restitution and fine of up to 250,000 dollars.
This shows the federal government is steadfast to vigorous
enforcement of the laws, which govern computer intrusion.
References
Federal Bureau of Investigation. (2013). Retrieved from
http://www.fbi.gov/newyork/press-releases/2013/long-island-
software-programmer-arrested-for-hacking-into-network-of-
high-voltage-power-manufacturer
Pickard, G. (2015). Hacker Pleads Guilty in Digital Retaliation
Campaign. Retrieved from
http://www.topsecretwriters.com/2015/03/hacker-pleads-guilty-
in-digital-retaliation-campaign/
Secret, M. (2013, May 2). Ex-Worker Created Havoc With
Hacking, U.S. Says. The New York Times. Retrieved from
http://www.nytimes.com/2013/05/03/nyregion/ex-programmer-
pleads-not-guilty-in-long-island-computer-hacking-
case.html?_r=1
Software Programmer Pleads Guilty to Hacking into Network of
Long Island High-Voltage Power Manufacturer. (2015).
Retrieved from http://www.fbi.gov/newyork/press-
releases/2015/software-programmer-pleads-guilty-to-hacking-
into-network-of-long-island-high-voltage-power-manufacturer
Spellman High Voltage Electronics Corporation. (2015).
Retrieved from http://www.spellmanhv.com/en/About.aspx

More Related Content

DOCX
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
PDF
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
DOCX
Cyber security.docx
DOCX
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
DOCX
Ethical and security issues on MIS inte 322 assignment.docx
DOCX
Target Data Breach Case Study 10242014
DOCX
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
PDF
security_threats.pdf and control mechanisms
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
Cyber security.docx
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
Ethical and security issues on MIS inte 322 assignment.docx
Target Data Breach Case Study 10242014
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
security_threats.pdf and control mechanisms

Similar to METHODS TO STOP DIFFERENT CYBER CRIMES .docx (20)

DOCX
LandscapingA local landscaping company that provides lawn-mowing.docx
DOCX
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
PDF
Edu 03 assingment
PPTX
Cyber security
PPTX
Module 1.pptx
PDF
V01 i010413
DOCX
Introduction Over the past years, there have been increasing ca.docx
PDF
Internal Threats: The New Sources of Attack
PDF
Cyber Security Notes Unit 2 for Engineering
PDF
Combating Phishing Attacks
PPTX
Cybercrime
PDF
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
PDF
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
PPTX
Cyber Security Training in Office Environment
PDF
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
PPTX
lec 15.pptxlec 15.pptxlec 15.pptxlec 15.pptx
PDF
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
PDF
Top Positive and Negative Impacts of AI & ML on Cybersecurity
PPTX
chapter 5.pptxggggggggggggggggggggggggggg
LandscapingA local landscaping company that provides lawn-mowing.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
Edu 03 assingment
Cyber security
Module 1.pptx
V01 i010413
Introduction Over the past years, there have been increasing ca.docx
Internal Threats: The New Sources of Attack
Cyber Security Notes Unit 2 for Engineering
Combating Phishing Attacks
Cybercrime
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Cyber Security Training in Office Environment
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
lec 15.pptxlec 15.pptxlec 15.pptxlec 15.pptx
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
Top Positive and Negative Impacts of AI & ML on Cybersecurity
chapter 5.pptxggggggggggggggggggggggggggg

More from andreecapon (20)

DOCX
MGMT 511Location ProblemGeorge Heller was so successful in.docx
DOCX
MGMT 464From Snowboarders to Lawnmowers Case Study Case An.docx
DOCX
MG345_Lead from Middle.pptLeading from the Middle Exe.docx
DOCX
MGMT 345Phase 2 IPBusiness MemoToWarehouse ManagerFrom[You.docx
DOCX
MGMT 3720 – Organizational BehaviorEXAM 3(CH. 9, 10, 11, & 12).docx
DOCX
Mexico, Page 1 Running Head MEXICO’S CULTURAL, ECONOMI.docx
DOCX
MGM316-1401B-01Quesadra D. GoodrumClass Discussion Phase2.docx
DOCX
METROPOLITAN PLANNING ANDENVIRONMENTAL ISSUESn May 2008, the N.docx
DOCX
Methods of Moral Decision Making REL 330 Christian Moralit.docx
DOCX
MEPS_Inpatient Stay database.csduidpiddupersidevntidxeventrnerhevi.docx
DOCX
Mexico The Third War Security Weekly Wednesday, February 18.docx
DOCX
Mercy College .docx
DOCX
Merger AnalysisMerger Analysis Case Study© 2007 South UniversityFr.docx
DOCX
MGMT 301 EOY Group” Case Study and Power Point Presentation G.docx
DOCX
MGMT 464New Manager’s Case Study Case Analysis Worksheet #.docx
DOCX
META-INFMANIFEST.MFManifest-Version 1.0.classpath.docx
DOCX
Menu Management Options· · APRN504 - 5886 - HEALTH POLICY .docx
DOCX
MGMT 673 Problem Set 51. For each of the following economic cond.docx
DOCX
Mental Illness Stigma and the Fundamental Components ofSuppo.docx
DOCX
Merck & Co. Inc. MRKCopy and pasteany three Notes to the Fina.docx
MGMT 511Location ProblemGeorge Heller was so successful in.docx
MGMT 464From Snowboarders to Lawnmowers Case Study Case An.docx
MG345_Lead from Middle.pptLeading from the Middle Exe.docx
MGMT 345Phase 2 IPBusiness MemoToWarehouse ManagerFrom[You.docx
MGMT 3720 – Organizational BehaviorEXAM 3(CH. 9, 10, 11, & 12).docx
Mexico, Page 1 Running Head MEXICO’S CULTURAL, ECONOMI.docx
MGM316-1401B-01Quesadra D. GoodrumClass Discussion Phase2.docx
METROPOLITAN PLANNING ANDENVIRONMENTAL ISSUESn May 2008, the N.docx
Methods of Moral Decision Making REL 330 Christian Moralit.docx
MEPS_Inpatient Stay database.csduidpiddupersidevntidxeventrnerhevi.docx
Mexico The Third War Security Weekly Wednesday, February 18.docx
Mercy College .docx
Merger AnalysisMerger Analysis Case Study© 2007 South UniversityFr.docx
MGMT 301 EOY Group” Case Study and Power Point Presentation G.docx
MGMT 464New Manager’s Case Study Case Analysis Worksheet #.docx
META-INFMANIFEST.MFManifest-Version 1.0.classpath.docx
Menu Management Options· · APRN504 - 5886 - HEALTH POLICY .docx
MGMT 673 Problem Set 51. For each of the following economic cond.docx
Mental Illness Stigma and the Fundamental Components ofSuppo.docx
Merck & Co. Inc. MRKCopy and pasteany three Notes to the Fina.docx

Recently uploaded (20)

PDF
Empowerment Technology for Senior High School Guide
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
RMMM.pdf make it easy to upload and study
PDF
Computing-Curriculum for Schools in Ghana
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Trump Administration's workforce development strategy
PDF
advance database management system book.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Cell Types and Its function , kingdom of life
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Introduction to Building Materials
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Empowerment Technology for Senior High School Guide
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
RMMM.pdf make it easy to upload and study
Computing-Curriculum for Schools in Ghana
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Weekly quiz Compilation Jan -July 25.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Trump Administration's workforce development strategy
advance database management system book.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Cell Types and Its function , kingdom of life
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Introduction to Building Materials
Final Presentation General Medicine 03-08-2024.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين

METHODS TO STOP DIFFERENT CYBER CRIMES .docx

  • 1. METHODS TO STOP DIFFERENT CYBER CRIMES 1 Methods to Stop Different Cyber Crimes People must be well-informed regarding internet scams and certain vulnerabilities, which permit them to occur sooner or later. With education, they will be in a situation to help in prevention of such scams successfully (Hynson, 2012). It is imperative for people to be familiar with attempts of cybercrimes and to comprehend correct solutions in internet practices and solutions. People will learn with education how to put into practice proper security protocols. When they develop into social media savvy people and when they learn how to safe guard their computer devices, cybercriminals will encounter multiple layers of security, which will limit their illegal activities substantially. Firewalls have the capability to protect users and their network devices against cyber criminals in the first instance of a attempted breach (Lehto,2013). A firewall monitors the interchange between a local network or the internet and a user’s computer. The firewall should be enabled through the security software or a router. Cybercriminals will be unable to use the interchange traffic to install malware, which is intended to compromise the user’s network and computer. If more people would use firewalls, hackers would be at a chief disadvantage due to being unable to navigate deeper into a system to obtain sensitive information and eventually, cybercrime would be lessened for a time. Users need to analyze their operating and online systems continually so they can resolve vulnerabilities (Hynson, 2012). Internal accounting information or protocols, which lead to financial information or bank statements, should be checked on a regular basis in order to recognize the risks and mitigate them accordingly. It is very difficult for people to curb the flow of
  • 2. cybercrimes if they are ignorant of the risks in which they face or the weaknesses, which exist within their systems. One successful way of slowing the actions of cyber criminals is by acting like them. This requires law enforcement agencies such as the Federal Bureau of Investigation (FBI) to assign special undercover agents to gain access to clubs or groups of cyber criminals so they can investigate their steps (Hynson, 2012). The investigation method will become more effective by identifying the source of the problem and in developing a stronger strategy to cripple the efforts of the criminals. Cyber criminals can hack into systems without difficulty when they encounter uncomplicated passwords. Users should use passwords with at least 10 or more characters so they can amplify the complexity of logging into the computer system (Lehto, 2013). It also helps top add in capital letters and special characters to increase the complexity of a password. In addition, different accounts should have dissimilar ID’s or password combinations to avoid giving hackers access to all of your accounts. The complex passwords should also be changed on a regular basis so criminals cannot find any type of consistency in information. Cross-domain solutions involve different organizations and law enforcement agencies, which have a combined system ensuring all cyber activities, are monitored continually (Hynson, 2012). The verification of automatic and manual access or transfer of information is authenticated through the hardware and software of the system for different levels of security classification. Accessing a variety of domains will be very complicated for cyber criminals while users can get hold of the information they require with no trouble. References Hynson, C. (2012). Cybercrime. Mankato, Minn: Smart Apple Media. Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International
  • 3. Journal of Cyber Warfare and Terrorism (ijcwt), 3(3), 1-18. VENGEFUL EMPLOYEE2 VENGEFUL EMPLOYEE5 Vengeful Employee John Stahlschmidt Grantham University Running head: VENGEFUL EMPLOYEE 1 Vengeful Employee Michael Menese a 43-year-old computer programmer used to reside in Smithtown, Long Island, who was employed with Spellman high voltage electronic corporation. Spellman founded in 1947 a company who is a provider of direct current and precision high voltage power supplies for the medical, industrial, and scientific communities ("About Us," 2015, p. 1). Menese worked for this company from May 2008 until January 2015. He left the company after being passed over for promotion multiple times and became upset with the company (Secret, 2013, p. 1). His specialty working for the company was in software programming and systems manager specializing in developing and customizing software, which the company used to run its day to day business operations ("Long Island
  • 4. Software Programmer Arrested for Hacking into Network of High-Voltage Power Manufacturer," 2013, p. 1). He was one of two employees who primarily were responsible for the company’s software running, production planning, purchasing, and inventory control, giving him a high access level to the company’s computer network. After giving his two-week notice Menese, decided to start a vengeance campaign against the company. Before his access was removed he installed a program to capture employee’s user login and passwords. Using this information and the security credential of at least one former co-worker, he would remotely connect into the company’s network by using a virtual private network (VPN) from his home and a hotel near his new employer’s location. Soon employees at the company noticed things were happening with the computer system, which they felt were out of the ordinary. They were unable to process routine transactions, receiving error messages instead. Menese bent on revenge against his former company, exploited his access and technical knowledge to wage a sabotage campaign against his former company. He altered the business calendar by a month, disrupting production and finance operations. Due to this the company suffered over 90,000 dollars in losses because of Menese’s intrusions into the system. He also accessed the email from his former supervisor and would use a separate email account to send messages to potential candidates for his job not to accept any job offers from the company (Pickard, 2015, p. 1). The Company logged a complaint alleging, the defendant engaged in a 21st Century campaign of cyber-vandalism and high-tech revenge, hacking into the computer network of the company Mr. Menese’s former employer to disrupt its operations, thereby causing tens of thousands of dollars in damage. United States Attorney Lynch stated “We will hold accountable any individual who victimizes others by exploiting computer network vulnerabilities ("Long Island Software Programmer Arrested for Hacking into Network of High-
  • 5. Voltage Power Manufacturer," 2013, p. 1).” Menese was caught 2 May 2013 by investigators who traced the email account to warn off potential candidates for his old job. One place it was traced to was an Internet protocol address, which belonged to Menese new employer. They traced the calendar changes to a hotel in North Carolina, which happened to be a very short distance away from Mr. Menese new job. Checking the hotel records the investigators found Menese to be staying in the hotel at the time of the cyber attacks. At the time he was caught, Menese pleaded not guilty. On 6 March 2015 in the federal courthouse in New York, Michael Menese pleaded guilty to hacking into his former company’s computer network. The items brought before the court in which Mr. Menese did where: The defendant deleted a line of code in a software program that the victim company used to calculate work order costs, leading the company to incorrectly calculate these costs, The defendant remotely accessed the victim company’s network, read an e-mail sent by his former supervisor to one of his former colleagues about a candidate for the defendant’s former position, created the e-mail address [email protected],” and sent the candidate a message that stated, “Don’t accept any position from [the victim company],” the defendant gained unauthorized access to the victim company’s network and modified a database so it would appear to be March 2012 rather than February 2012. As a result, the company was unable to process routine transactions, and the defendant remotely accessed the victim company’s network and manually purged a purchase order table, which prevented the company from converting purchase requisitions to purchase orders ("FBI," 2015, p. 1) With the guilty plea Mr. Menese will be charged on 7 July 2015. Mr. Menese will be facing up to 10 years in a federal prison, as well as a restitution and fine of up to 250,000 dollars. This shows the federal government is steadfast to vigorous enforcement of the laws, which govern computer intrusion.
  • 6. References Federal Bureau of Investigation. (2013). Retrieved from http://www.fbi.gov/newyork/press-releases/2013/long-island- software-programmer-arrested-for-hacking-into-network-of- high-voltage-power-manufacturer Pickard, G. (2015). Hacker Pleads Guilty in Digital Retaliation Campaign. Retrieved from http://www.topsecretwriters.com/2015/03/hacker-pleads-guilty- in-digital-retaliation-campaign/ Secret, M. (2013, May 2). Ex-Worker Created Havoc With Hacking, U.S. Says. The New York Times. Retrieved from http://www.nytimes.com/2013/05/03/nyregion/ex-programmer- pleads-not-guilty-in-long-island-computer-hacking- case.html?_r=1 Software Programmer Pleads Guilty to Hacking into Network of Long Island High-Voltage Power Manufacturer. (2015). Retrieved from http://www.fbi.gov/newyork/press- releases/2015/software-programmer-pleads-guilty-to-hacking- into-network-of-long-island-high-voltage-power-manufacturer Spellman High Voltage Electronics Corporation. (2015). Retrieved from http://www.spellmanhv.com/en/About.aspx