Feeds

IT consultant gets 5 years for plundering $2m

... from banks he administered

5 things you didn’t know about cloud backup

A contractor who provided IT administration services to banks was sentenced to more than five years in prison this week after admitting he used his insider knowledge to plunder some $2m from four financial institutions.

Zeldon Thomas Morris, 43, was ordered to serve 63 months in federal prison and pay restitution of a little more than $1.8m, according to documents filed in US District Court in Utah. The rogue employee was also required to forfeit cars, real estate, and other personal property, and prohibited for life from "participating in any manner in the affairs of any federally regulated financial institution."

The sentence, handed down on Wednesday by US District Judge Clark Waddoups, came two weeks after Morris signed documents pleading guilty to one felony count of bank fraud. Using his unrestricted access needed to install software updates on the banks' systems, he was able to make fictitious transactions that transferred funds into accounts he controlled.

"Because of my position in upgrading the software, I was able to carry out this scheme without detection for nearly two-and-a-half years, from approximately August of 2006 until approximately April of 2009," Morris wrote in the court document.

"During that period, I used the means I have described to steal approximately $2 million dollars from four financial institutions, including, as part of my scheme, transferring stolen funds among those institutions to disguise the ongoing fraud."

The case is the latest to highlight the threat insiders pose to banks and other businesses trying to secure highly sensitive information. Besides financial gain, many stand accused of using their privileged access to exact revenge on their employers. ®

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.