Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
Report: US FCC to allow payments for speedier traffic
China working on Linux replacement for Windows XP
FCC adds $9 billion to broadband subsidy fund
Raspberry Pi alternatives emerge to fill need for speed
It's now possible to wirelessly charge 40 smartphones from 16 feet away
Ex-FCC commissioner to head CTIA in latest Washington shuffle
Go time traveling with Google Maps
While Heartbleed distracts, hackers hit US universities
Survey respondents shun much-hyped mobile shopping technologies
Survey respondents shun much-hyped mobile shopping technologies
7 Ways to Advance Your Project Management Career
How Apple's billion dollar sapphire bet will pay off
US to vote on sharp increase in broadband subsidies
iPhone 6 rumor rollup for the week ending April 18
NSA spying revelations have tired out China's Huawei
Arista co-founder may have switch maker by its jewels
Apple kicks off public OS X beta testing
Open source pitfalls – and how to avoid them
AT&T's expanded 1 Gbps fiber rollout could go head to head with Google
BlackBerry Releases BES 10 Security Update to Address 'Heartbleed' Flaw
Verizon: Web apps are the security punching bag of the Internet
Cisco announces security service linked with new operations centers
Dell launches virtual storage accelerator, aims to boost SAN performance
Free OS X Mavericks now powers half of all Macs
/

The Tim Lloyd saga

Related linksToday's breaking news
Send to a friendFeedback

October, 1985
Tim Lloyd joins Omega Engineering as a machinist.

1989
Lloyd proposes computer network at Omega South.

1989
Lloyd is promoted to supervisor.

1990
Lloyd becomes LAN manager.

1995
Lloyd is removed from a project after his failure to do quality tests causes massive customer returns.

September 1994
Lloyd receives Novell certification training.

May 31, 1995
Lloyd is written up for stalling efforts to produce needed components, inability to work as part of a team and allegations of mistreating coworkers.

July 1995
Lloyd is demoted from supervisor to engineer.

Feb. 21, 1996
First test version of the software time bomb is created.

April 21, 1996
Second test version of the time bomb is created.

April 23, 1996
Bad performance memo is put in Lloyd's file.

May 30, 1996
Third test version of the time bomb is created.

May 20, 1996
Lloyd attends job fair.

June 5, 1996
Lloyd has first job interview at W.L. Gore.

June 1996
Lloyd removes programs and code generators from workstations, centralizing them on the file server.

June 21, 1996
Lloyd has second job interview at W.L. Gore.

July 1, 1996
Lloyd asks for and is given the backup tape for the file server.

July 10, 1996
Lloyd is fired.

July 10, 1996
Lloyd checks off statement on his exit interview questionnaire saying he does not have any Omega property at home.

July 31, 1996
Time bomb goes off and takes down the file server.

Aug. 6, 1996
Omega calls in Ontrack Data to take over data-recovery efforts.

Aug. 7, 1996
The backup tape, which is later found in Lloyd's home, is erased.

Aug. 12, 1996
Omega calls in the U. S. Secret Service.

Aug. 21, 1996
The Secret Service executes search warrant on Lloyd's home.

Feb. 18, 1997 to Feb. 21, 1997
Ontrack discovers the time bomb code.

Jan. 28, 1998
Lloyd is indicted.

Feb. 17, 1998
Lloyd is arraigned.

April 17, 2000
Lloyd's trial begins.

May 9, 2000
Jury delivers a guilty verdict on computer sabotage and acquits Lloyd on the theft charge.

Related links

Contact Features Writer Sharon Gaudin

Other recent articles by Gaudin

The Omega files
Our main feature story.

G-men target e-crime
The Tim Lloyd computer sabotage trial may be the first of its kind, but agents at the U.S. Secret Service expect it won't be the last.

How to protect your network
Here 's a list of tips culled from industry analysts, security experts, corporate executives and agents of the U.S. Secret Service.

Legal system gears up for computer crime cases
With computer crimes expected to increase in both frequency and destructive power, the legal system will have to beef up its technical savvy to deal with the coming onslaught, according to industry and legal watchers.


NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.