What are the differences and similarities between these two cyber attacks regarding the incident locations?

1) Briefly summarize the incident and illustrate the countermeasures, if any.
2) What are the differences and similarities between these two cyber attacks regarding the incident locations?
3) Discuss how TCB and Rings of Trust were/could be utilized in these two incidents.
4) Are there any cyber crime laws involved in this cyber news? What are they? Illustrate your argument.
5) Can computer forensics be used to investigate this cyber crime? If the cyber news article discusses this, summarize how computer forensics were used in that investigation. If the article does not provide such information, what would computer forensics help you to investigate this cyber crime?
6) Are there any codes of ethics violated in this cyber news by security professionals? If so, what are their motives to commit these cyber crimes?