Seattle man gets 51 months in jail in ID theft case
Gregory Kopiloff pleaded guilty to charges of ID theft over P2P
Computerworld - Gregory Kopiloff, a Seattle man who pleaded guilty last November to stealing identity information over peer-to-peer (P2P) file-sharing networks has been sentenced to 51 months in prison.
In addition, Seattle District Court Judge James Robart ordered Kopiliff to serve in a three-year supervised-release program at the end of his prison term.
Kopiloff, 35 was arrested by federal authorities in September 2007 and charged with using P2P software such as LimeWire and Soulseek to snoop for and steal banking and credit information belonging to users on file-sharing networks. He was the first person in the U.S. to be indicted on charges of committing identity theft over P2P networks.
According to court documents, between March 2005 and August 2007, Kopiloff surreptitiously gained access to banking, financial and personal data stored on the computers of other users on file-sharing networks. To get to that data, Kopiloff sometimes searched specifically for federal income tax returns, student financial aid applications and credit reports stored on users' systems. He also used the data to screen potential victims based on their income levels and credit histories in order to identify the most credit-worthy people.
He then used the stolen data to open fraudulent credit accounts or to make fraudulent purchases that he then had shipped to different locations in the Seattle area. The merchandise was later resold -- typically for half its purchase price, court documents said.
At the time of his arrest, Kopiloff had bought between $73,000 and $120,000 worth of merchandise using identity information belonging to at least 83 people.
Kopiloff in November pleaded guilty to mail fraud, accessing a protected computer without authorization to further fraud and aggravated identity theft. He faced a maximum of 20 years in prison and fines of up to $250,000.
Robart's sentence appeared to be in line with the government's call for a 54-month prison term.
In arguing for a prison term, prosecutors described Kopiloff's use of P2P networks as a "particularly pernicious and devious" technique for committing identity theft. "The defendant exploited the recent developments in 'peer to peer' computer file-sharing technology to access the most private financial information imaginable from the personal home computers of scores of victims located throughout the United States," Assistant U.S. Attorney Kathryn Warma said in court documents.
Warma noted that the use of P2P software on home computers, sometimes installed by young people without their parents' consent, can open up all of the data on these systems to criminals. Typically, victims have no clue how their identity information and other confidential data leaked out, she said.
Warma said that Kopiloff's techniques were not "run of the mill" and deserved a "sentence at the high end" of what would be applicable.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Cybercrime and Hacking White Papers | Webcasts