Finding the individuals that made it possible could be difficult. Don't be surprised if some of these folks who got caught plead ignorance or lack of knowledge of the gravity for the situation, when and if they are in front of a judge.
http://www.making-a-difference.org/computer-crime-chronicles.htm(snip)
57. As discussed above, employees represent the greatest threat in terms of
computer crime. It is not uncommon, operators, media librarians, hardware
technicians and other staff members to find themselves in positions of
extraordinary privilege in relation to the key functions and assets of their
organization. A consequence of this situation is the probability that such
individuals are frequently exposed to temptation.
58. A further complication is the tendency on the part of management to
tolerate less stringent supervisory controls over EDP personnel. The premise
is that the work is not only highly technical and specialized but difficult
to understand and control. As an example systems software support is often
entrusted to a single programmer who generates the version of the operating
system in use, establishes password or other control lists and determines
the logging and accounting features to be used. In addition, such personnel
are often permitted, and sometimes encouraged, to perform these duties
during non-prime shift periods, when demands on computer time are light. As
a result, many of the most critical software development and maintenance
functions are performed in an unsupervised environment. It is also clear
that operators, librarians and technicians often enjoy a degree of freedom
quite different from that which would be considered normal in a more
traditional employment area.
59. There is another factor at play in the commission of computer crime.
Criminological research has identified a variation of the Robin Hood
syndrome: criminals tend to differentiate between doing harm to individual
people, which they regard as highly immoral, and doing harm to a
corporation, which they can more easily rationalize. Computer systems
facilitate these kinds of crimes, as a computer does not show emotion when
it is attached.
60. Situations in which personnel at junior levels are trusted implicitly
and given a great deal of responsibility, without commensurate management
control and accountability, occur frequently in the EDP environment. Whether
the threat is from malicious or subversive activities or from honest errors
on the part of staff members, the human aspect is perhaps the most
vulnerable aspect of EDP systems.
(snip)