Feeds

eBay ID fraudster jailed

Four years for phisher king

Intelligent flash storage arrays

A UK-based phishing fraudster who raked in an estimated £200,000 after tricking eBay members into handing over their account details was jailed for four years on Tuesday. David Levi, 29, of Lytham, Lancashire, who is already in prison serving a four-year sentence for drug offences, pleaded guilty to three counts of fraud. He was sentenced to three years imprisonment for the fraud charges to run concurrently with his present spell of porridge. In addition, he also received a 12-month consecutive sentence for perverting the course of justice.

Preston Crown Court heard that Levi masterminded a phishing scam that conned more than 160 people into handing over their password and user names in response to bogus email security notices purporting to come from the auction site. Levi and his cohorts assumed the identities of these people between July 2003 and July 2004 to lend credibility to bogus auctions of non-existent goods.

Levi's younger brother, Guy, 22, of St Anne's, Lancs, and co-conspirator Daniel Lett, 22, of Lytham, Lancs were jailed for 21 months and two years respectively after admitting conspiracy to defraud. Four accomplices who permitted the use of their bank accounts to receive the proceeds of bogus auctions were each sentenced to six months imprisonment, The Daily Telegraph reports. These four were named as Derek Anderson, 59, of St Annes, Lancs; Craig Jameson, 31, of Cheadle, Greater Manchester; Gareth Rice, 22, of St Annes, Lancs and Chris Worden, 23, of Blackpool, Lancs.

Sentencing of the Lancashire gang this week comes days after a different UK-based gang were jailed for a total of eight and a half years over a separate fraud. Nicolae Cretanu, 30, and his wife Adriana, 23, a Romanian couple based in east London, conned victims into handing over cash for non-existent goods.

The duo operated using 12 alias to run bogus auctions for approximately two years. Victims were told they had failed to win auctions for anything from non-existent cars to concert tickets before being offered a "second chance" to secure goods by sending cash directly to the gang, who pocketed the dosh without delivering anything but empty promises. George Titar, 23, a Romanian illegal immigrant, was used by the gang as a 'foot-soldier' to pick up their ill-gotten funds from Western Union offices in London. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.