IDG News Service - An identity thief who used a people search website to confirm stolen Social Security numbers has been sentenced to 16 years and seven months in prison, the U.S. Department of Justice announced.
Todd Yurgin, 41, of Newark, Del., was sentenced Thursday in U.S. District Court for the District of Delaware for his role in a "massive" ID theft scheme, the DOJ said in a news release. The scheme resulted in a loss of nearly $1 million to credit card-issuing financial institutions, the DOJ said.
Yurgin's sentence is the longest in Delaware history for fraud and ID theft, the DOJ said. Yurgin's partner in the scheme, Joseph Aughenbaugh, was sentenced to 12 years and one month in prison in November.
Yurgin pleaded guilty to six charges, including mail fraud, aggravated identity theft and money laundering, in August. He later tried to withdraw the plea, but Judge Gregory Sleet denied the request.
Yurgin and Aughenbaugh stole the mail of victims, then confirmed Social Security numbers through background search site USinfosearch.com and possibly other people search sites, said Robert Kravetz, assistant U.S. attorney.
USinfosearch.com said it maintains "strict security measures."
"Our online tools are clearly designed to prevent fraud and reduce risk," said Marc Martin, a spokesman for the company, via email. "Moreover, we do not provide information on juveniles and have no clients by the names listed."
Yurgin and Aughenbaugh stole the identities of 93 people, at least 44 of them children, the DOJ said. After confirming the victims' Social Security numbers, the two men applied for credit cards using the valid Social Security numbers and fictitious names, the agency said.
The two men targeted Social Security numbers issued to children because the victims "weren't likely to check their credit," Kravetz said.
Yurgin used the identity information to open at least 343 credit cards and 54 bank accounts from more than 40 financial institutions, and he formed two shell companies operating out of his residence to make fraudulent purchases for services. The two men did not pay the credit card companies for the fraudulent transactions, causing several financial institutions to incur significant losses, the DOJ said.
Yurgin's Delaware conviction was his third federal fraud conviction. During sentencing, Sleet called Yurgin a "professional con artist and criminal." The full extent of the scheme may never be uncovered, Sleet said.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is firstname.lastname@example.org.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Red Hat Enterprise Linux - The Original Cloud Operating System
- Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse
- Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center
- Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper
- Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support... All Government IT White Papers
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- All Government IT Webcasts