Feeds

World's largest ID theft felon faces 14 years' jail

Help desk technician pleads guilty to $50m scam

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

A former New York computer help desk technician yesterday pleaded guilty to playing a key part in what prosecutors reckon is the largest identity theft case to date.

Philip Cummings, 35, pleaded guilty to conspiracy over his central role in a scam believed to have hit upwards of 30,000 victims and cost millions through fraudulent transactions. At the time of Cummings' November 2002 indictment, investigators had confirmed losses of more than $2.7m in connection racket. Losses from the racket - which ran for approximately three years - are now estimated to exceed $50m.

Cummings worked for Teledata Communications, which supplies software to link the systems of banks and credit reference agencies from mid-1999 until March 2000. He used this role to obtain confidential passwords and codes to download potential victims' credit reports before selling them on to crooks. Cummings was paid $30 for each report. The information he sold enabled criminals to impersonate victims and obtain fraudulent loans, access bank accounts and run up unauthorised credit card bills in their name. More than 15,000 credit reports were stolen from credit reference bureau Experian, using passwords belonging to Ford Motor Credit Corporation. The passwords and subscriber codes of Washington Mutual Bank in Florida and Washington Mutual Finance Company in Crossville, Tennessee were also compromised. Cummings used this information to download reports after he left Teledata and relocated from New York to Georgia.

The information sourced by Cummings fed a network of at least 20 ID fraudsters across the US, according to prosecutors. A number of people have already pleaded guilty to involvement in the scam while other case remain pending.

Reuters reports that Cummings could be jailed for at least 14 years and fined $1m after confessing to conspiracy, wire fraud and fraud offences in connection with his crimes. However he has a heart problem which might cause the authorities to impose a much more lenient sentence, it reports. Sentencing before US District Judge George Daniels has been set for 11 January 2005. ®

related stories

Feds break massive identity fraud
ID theft: a $1bn a year crime
150+ cuffed in US-led cybercrime crackdown
Spammer charged in huge Acxiom personal data theft
ID theft hits 10m Americans a year

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.