Search /
Advanced search  |  Help  |  Site map
Click for Layer 8! No, really, click NOW!
Networking for Small Business
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested

The Tim Lloyd saga

Related linksToday's breaking news
Send to a friendFeedback

October, 1985
Tim Lloyd joins Omega Engineering as a machinist.

Lloyd proposes computer network at Omega South.

Lloyd is promoted to supervisor.

Lloyd becomes LAN manager.

Lloyd is removed from a project after his failure to do quality tests causes massive customer returns.

September 1994
Lloyd receives Novell certification training.

May 31, 1995
Lloyd is written up for stalling efforts to produce needed components, inability to work as part of a team and allegations of mistreating coworkers.

July 1995
Lloyd is demoted from supervisor to engineer.

Feb. 21, 1996
First test version of the software time bomb is created.

April 21, 1996
Second test version of the time bomb is created.

April 23, 1996
Bad performance memo is put in Lloyd's file.

May 30, 1996
Third test version of the time bomb is created.

May 20, 1996
Lloyd attends job fair.

June 5, 1996
Lloyd has first job interview at W.L. Gore.

June 1996
Lloyd removes programs and code generators from workstations, centralizing them on the file server.

June 21, 1996
Lloyd has second job interview at W.L. Gore.

July 1, 1996
Lloyd asks for and is given the backup tape for the file server.

July 10, 1996
Lloyd is fired.

July 10, 1996
Lloyd checks off statement on his exit interview questionnaire saying he does not have any Omega property at home.

July 31, 1996
Time bomb goes off and takes down the file server.

Aug. 6, 1996
Omega calls in Ontrack Data to take over data-recovery efforts.

Aug. 7, 1996
The backup tape, which is later found in Lloyd's home, is erased.

Aug. 12, 1996
Omega calls in the U. S. Secret Service.

Aug. 21, 1996
The Secret Service executes search warrant on Lloyd's home.

Feb. 18, 1997 to Feb. 21, 1997
Ontrack discovers the time bomb code.

Jan. 28, 1998
Lloyd is indicted.

Feb. 17, 1998
Lloyd is arraigned.

April 17, 2000
Lloyd's trial begins.

May 9, 2000
Jury delivers a guilty verdict on computer sabotage and acquits Lloyd on the theft charge.

Related links

Contact Features Writer Sharon Gaudin

Other recent articles by Gaudin

The Omega files
Our main feature story.

G-men target e-crime
The Tim Lloyd computer sabotage trial may be the first of its kind, but agents at the U.S. Secret Service expect it won't be the last.

How to protect your network
Here 's a list of tips culled from industry analysts, security experts, corporate executives and agents of the U.S. Secret Service.

Legal system gears up for computer crime cases
With computer crimes expected to increase in both frequency and destructive power, the legal system will have to beef up its technical savvy to deal with the coming onslaught, according to industry and legal watchers.

NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.