Michael W. Baxter, 62, a former network engineer for Verizon Wireless, took advantage of flaws in the company’s procurement process to obtain access to millions of dollars in Cisco equipment, which he then sold in order to fund what authorities call a lavish lifestyle.
Between 1994 and 2010, Baxter was employed as a network engineer at Verizon Wireless. According to court documents, between 2001 and 2010 he used an extended warranty contract from Cisco to obtain parts that were valued at $40,000 per item or more, as one of the people authorized to access procurement system.
Instead of placing the replacement parts into service in Verizon Wireless’ network, Baxter simply took them home and sold them to third-party re-sellers for his own profit. Baxter then used the illicit proceeds from the sale of this equipment to buy jewelry, cars, extravagant international travel, and other personal luxury goods and services, including multiple cosmetic surgeries for his girlfriend.
“To accomplish his fraud, this defendant exploited a program designed to keep this critical infrastructure running uninterrupted: Cisco’s program for replacing expensive equipment on a moment’s notice. He also abused his insider access to Verizon’s procurement system. He funded a lavish lifestyle with his stolen funds and has now earned himself several years in a federal prison,” United States Attorney Sally Quillian Yates said in a statement.
There has been no explanation as to how Baxter wasn’t flagged sooner for his abuse, but Verizon reported a half-million dollars in fraudulent replacement part orders. It seems that given the scale of Verizon’s procurement system, it just fell below the threshold of the company’s audit system.
Baxter was sentenced to four years in prison, which will be followed by three years of supervised release, last week by a federal court in Georgia. In addition, he was ordered to pay $2,333,241.18 in restitution to Cisco Systems and $462,828.00 in restitution to Verizon.
Baxter pled guilty to the charges against him in February.
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Comcast Wants a Slice of the Enterprise Cybersecurity Business
