IDG News Service - An identity thief who used a people search website to confirm stolen Social Security numbers has been sentenced to 16 years and seven months in prison, the U.S. Department of Justice announced.
Todd Yurgin, 41, of Newark, Del., was sentenced Thursday in U.S. District Court for the District of Delaware for his role in a "massive" ID theft scheme, the DOJ said in a news release. The scheme resulted in a loss of nearly $1 million to credit card-issuing financial institutions, the DOJ said.
Yurgin's sentence is the longest in Delaware history for fraud and ID theft, the DOJ said. Yurgin's partner in the scheme, Joseph Aughenbaugh, was sentenced to 12 years and one month in prison in November.
Yurgin pleaded guilty to six charges, including mail fraud, aggravated identity theft and money laundering, in August. He later tried to withdraw the plea, but Judge Gregory Sleet denied the request.
Yurgin and Aughenbaugh stole the mail of victims, then confirmed Social Security numbers through background search site USinfosearch.com and possibly other people search sites, said Robert Kravetz, assistant U.S. attorney.
USinfosearch.com said it maintains "strict security measures."
"Our online tools are clearly designed to prevent fraud and reduce risk," said Marc Martin, a spokesman for the company, via email. "Moreover, we do not provide information on juveniles and have no clients by the names listed."
Yurgin and Aughenbaugh stole the identities of 93 people, at least 44 of them children, the DOJ said. After confirming the victims' Social Security numbers, the two men applied for credit cards using the valid Social Security numbers and fictitious names, the agency said.
The two men targeted Social Security numbers issued to children because the victims "weren't likely to check their credit," Kravetz said.
Yurgin used the identity information to open at least 343 credit cards and 54 bank accounts from more than 40 financial institutions, and he formed two shell companies operating out of his residence to make fraudulent purchases for services. The two men did not pay the credit card companies for the fraudulent transactions, causing several financial institutions to incur significant losses, the DOJ said.
Yurgin's Delaware conviction was his third federal fraud conviction. During sentencing, Sleet called Yurgin a "professional con artist and criminal." The full extent of the scheme may never be uncovered, Sleet said.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is firstname.lastname@example.org.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Accelerating Speed to Market in the Highly Competitive Automotive Industry
- This White Paper discusses how an Enterprise Project Portfolio Management solution optimizes project analysis, management, reporting and risk mitigation processes to accelerate new... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- HR and Finance Were made for Each Other View now >>
- The Value of Human Capital for Finance Professionals View now >>
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.