The Wayback Machine - https://web.archive.org/web/20071021201217/http://computerworld.com:80/action/article.do?command=viewArticleBasic&taxonomyId=17&articleId=9016884&intsrc=hm_topic
Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Finance
Security
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.

Reverse hacker case gets costlier for Sandia Labs

On top of $4.7M jury award, post-judgment interest adds $60,000 a month
Jaikumar Vijayan   Today’s Top Stories    or  Other Security Stories  
 

Sign up to receive Security Resource Alerts

April 17, 2007 (Computerworld) -- A wrongful termination lawsuit against Sandia National Laboratories that resulted in a jury award of more than $4.7 million in damages to Shawn Carpenter, a former security analyst at the organization, may be getting even more costly for the labs.

A district court judge in the state of New Mexico, where the case was heard, recently awarded 15% per year post-judgment interest on the original award as allowed under state law. The amended final judgment means that interest in the amount of almost $60,000 per month is accumulating while Sandia's appeal against the jury award works it way through the courts.

Following that judgment, "Sandia is posting a supersedeas bond in the amount of $5.8 million to cover a year and a half of interest and the judgment," Carpenter said. Such a bond allows Sandia to delay payment of a judgment until the appeals process is over.

"The purchase price of the bond is face value, plus additional fees, and guarantees that they will pay the judgment should the appeals fail," Carpenter said. "We are trying to find out who is paying for all of this. The answer is most likely the taxpayers," he added.

Sandia officials have said they intend to appeal the amended final judgment to the New Mexico Court of Appeals and, if necessary, to the Supreme Court of New Mexico.

A Sandia spokesman today said the organization would "take all steps necessary" to pursue its right of appeal in the case. "While Sandia respects the jury process, Sandia maintains that the verdict in this case was erroneous," the spokesman said in an e-mailed comment.

"Like all employers, Sandia must retain the ability to discipline its employees when they take action in violation of law, refuse supervisory instructions or act without authorization," he said.

The spokesman said Sandia officials could not comment further because of the ongoing legal proceedings.

Carpenter worked as a network intrusion detection analyst at Sandia. He was fired in January 2005 for sharing information related to an internal network compromise with the FBI and the U.S. Army. Sandia alleged that Carpenter had inappropriately shared confidential information he had gathered in his role as a security analyst for the laboratory.

Carpenter said he had done so only for national security reasons. He said his independent investigations of a May 2004 breach had unearthed evidence showing that the intruders who had broken into Sandia's networks belonged to a Chinese hacking group called Titan Rain, which also had attacked other sensitive networks and stolen U.S. military and other classified documents. He claimed that he had tried in vain to get the information to the other agencies through proper channels at Sandia before deciding to share the information on his own.

After getting fired, Carpenter filed a wrongful termination lawsuit against Sandia. In February 2007, a New Mexico jury awarded Carpenter a total of more than $4.3 million in punitive damages and more than $400,000 in other damages. During the trial, the jury heard testimony about how a Sandia official had told Carpenter he would've been "decapitated" or how there "would at least be blood all over the office" if Carpenter had been working directly for him.

After the verdict, Sandia filed several post-trial motions, including one that asked for a new trial and another that asked the judge to reduce the amount of the jury award.

"During the course of litigation, we made several settlement offers, and they ignored all of them," Carpenter said. "The one offer they made wasn't even worthy of consideration," he said.




Print this Story Send Us Feedback E-mail this Story Digg! Digg this Story Slashdot this Story
" In recent days, the Transportation Security Administration (TSA), Home Depot and Administaff have managed to join an ignominious list of..." Read more...
" So the blogger world is in an uproar about what we are all doing and where we go from here..." Read more...
Read more Security posts or See all Blogs
Exploit code found served from popular advertising site
Microsoft shows off leaner kernel for Windows 7
Mozilla fixes 10 Firefox flaws, makes it Leopard-ready
More top stories...
Experts say proposed security standards for power grid not enough
Social engineering: The good guys strike back
New study to comb Secret Service ID-theft case files
Consumer devices and services pose threats to security and infrastructure stability. Which are the worst, and what can you do about it?
We asked usability experts to compare the iPhone with two competitors to see if Apple's device matches its hype. They came up with an unequivocal answer.
Can Apple make even a spreadsheet cool? Our reviewer examines the new office productivity suite for the Mac.
With IT's unfettered access to both professional and personal data, should "follow your conscience" be part of the job description?
Reviews, analyses, how-tos, visual tours, hot issues and predictions about Microsoft's new OS.
Four years from now, the IT field will be a vastly different place. Will you be ready?
All Zones
Customer Experience Management Zone
Performance Management Zone
The SAS Zone
Software Zone
Strategies for Achieving a More Efficient Data Center Zone
The Vulnerability Management & Policy Compliance Zone
The Web Conferencing Zone
ITIL Best Practices Zone
Application Development Optimization Zone

Ads by TechWords

See your link here
Strategies for Protecting Against Internet Threats
Download this Technology Briefing, free, compliments of St. Bernard Software, for a limited time.
(Source: Computerworld)

It is through the Web that the most potentially harmful and malicious threats can enter a computer system. Yet, nearly half of all organizations in the U.S. continue to do nothing about Web Filtering or blocking.

Learn about the effective and affordable strategies that your organization can use to protect itself from internet threats in the new report from Computerworld. For a limited time this report is being made available at no cost to our customers, compliments of St. Bernard Software.

Download this executive briefing download
Industry Experts Discuss Storage Reliability and Recovery
Industry Experts Discuss Storage Reliability and Recovery
Watch this webcast now!
Go to the webcast 
Symantec Endpoint Protection - A Unified, proactive approach to endpoint security
Get this white paper now!
(Source: Symantec) To combat the sophisticated, stealthy, and targeted attacks of today's threat landscape, organizations can no longer rely on traditional antivirus and antispyware solutions. It is necessary to implement additional layers of security to proactively protect against zero-day threats. Symantec Endpoint Protection combines essential best-in-breed technologies to deliver advanced threat prevention from known and unknown threats. Download this white paper to learn more.
Download this white paper go
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
Meet SOX Compliance & IT Control Objectives
Vulnerability Management for GLBA Compliance
eBay, Inc. - Securing the World's Online Marketplace
View more whitepapers 
Symantec Endpoint Security

Join Symantec's Kevin Murray for a look at the latest advances in endpoint security from Symantec. IT professionals with an interest in endpoint security and compliance will learn about a new product from Symantec that provides layered security, including: antivirus, firewall, intrusion prevention, device control & behavior blocking.

Learn how this breakthrough product, which combines best of breed technologies from Symantec, Sygate and Whole Security in a single agent, managed by a single management console, will help secure the endpoints on your network and ensure compliance with security policies.

Download this webcast 
Symantec Endpoint Protection - A Unified, proactive approach to endpoint security

To combat the sophisticated, stealthy, and targeted attacks of today's threat landscape, organizations can no longer rely on traditional antivirus and antispyware solutions. It is necessary to implement additional layers of security to proactively protect against zero-day threats. Symantec Endpoint Protection combines essential best-in-breed technologies to deliver advanced threat prevention from known and unknown threats. Download this white paper to learn more.

Download this white paper 
Symantec Network Access Control

The new wave of sophisticated crimeware not only targets specific companies, but it also targets desktops and laptops as backdoor entryways into those business' operations and resources. Network Access Control from Symantec enables proper configuration and security of user endpoints before they are allowed access on the corporate network. To find out more about this level of endpoint compliance, download this white paper.

Download this white paper