Language Selection

English French German Italian Portuguese Spanish

Former Microsoft employee sentenced two years

Filed under
Microsoft
Legal

A former Microsoft worker was sentenced Friday to two years in prison and ordered to pay $5 million in restitution after he admitted reselling software he stole from the company and using the money to pay off his mortgage, among other things.

Richard Gregg, 45, of Bellevue, admitted that from May to December 2002 he obtained 4,400 pieces of software - valued at more than $13 million - through an internal ordering program. He paid off the mortgage on his condominium, bought a Land Rover and made a $48,000 payment on a BMW.

With his assistance, federal investigators recovered about $7 million worth of stolen software.

Gregg told U.S. District Judge John C. Coughenour he was extremely remorseful and that the last 2 1/2 years had been "shamefully embarrassing."

THE ASSOCIATED PRESS
Source.

More in Tux Machines

today's howtos

Oracle Desperate

Leftovers: OSS and Sharing

Security Leftovers

  • Friday's security updates
  • Judge Says The FBI Can Keep Its Hacking Tool Secret, But Not The Evidence Obtained With It
    Michaud hasn't had the case against him dismissed, but the government will now have to rely on evidence it didn't gain access to by using its illegal search. And there can't be much of that, considering the FBI had no idea who Michaud was or where he resided until after the malware-that-isn't-malware had stripped away Tor's protections and revealed his IP address. The FBI really can't blame anyone but itself for this outcome. Judge Bryan may have agreed that the FBI had good reason to keep its technique secret, but there was nothing preventing the FBI from voluntarily turning over details on its hacking tool to Michaud. But it chose not to, despite his lawyer's assurance it would maintain as much of the FBI's secrecy as possible while still defending his client. Judge Bryan found the FBI's ex parte arguments persuasive and declared the agency could keep the info out of Michaud's hands. But doing so meant the judicial playing field was no longer level, as he acknowledged in his written ruling. Fortunately, the court has decided it's not going to allow the government to have its secrecy cake and eat it, too. If it wants to deploy exploits with minimal judicial oversight, then it has to realize it can't successfully counter suppression requests with vows of silence.
  • Researcher Pockets $30,000 in Chrome Bounties
    Having cashed in earlier in May to the tune of $15,500, Mlynski pocketed another $30,000 courtesy of Google’s bug bounty program after four high-severity vulnerabilities were patched in the Chrome browser, each worth $7,500 to the white-hat hacker.