Feeds

Bogus Baron BOFH banged up

Phoney peer gets 21 months' imprisonment

The Power of One eBook: Top reasons to choose HP BladeSystem

A phoney English Lord who stole a dead baby's identity to lead a fantasy life has been jailed for 21 months for passport fraud. 'Christopher Edward Buckingham' was sent to prison by a judge yesterday without revealing his true identity, after living 23 years under the assumed name.

The self-styled Earl of Buckingham married under this false name and fathered two children, whose nationality has now been called into question. He told his former wife Jody that his parents died in a plane crash in Egypt in 1982. The couple divorced in 1997.

The impostor's cover was blown after checks by the Passport Agency revealed he had stolen the identity of Christopher Edward Buckingham, an infant who died aged just eight months, in 1963. The ruse was copied from the one employed by the assassin in Frederick Forsyth’s novel The Day of the Jackal. Unlike that character "Buckingham" maintained an unremarkable life working as an IT security consultant for a Zurich-based Swiss insurance firm since 2001.

Buckingham's passport was revoked in 2003. He was arrested in January after routine checks by an alert immigration official in Calais showed he was travelling under fraudulent documentation. He was shipped back to the UK and charged with making a false passport application. He pleaded guilty to the offence at a hearing a Canterbury Crown Court last month.

Sentencing him on Tuesday, Judge Adele Williams said: "Someone does not assume a false identity unless there is a very good reason... You have shown a lack of remorse and have actively obstructed in revealing your true identity," he added

Detective Constable David Sprigg, the Kent Police officer who investigated the case, told The Daily Telegraph: "I think that he has got some dark secret that he is hiding and he doesn’t want us to know what it is." The mother of the real Christopher Buckingham, Audrey Wing, said the trial had brought back the agony of her baby son's untimely death during a caravan holiday in 1963.

Despite police appeals, Buckingham's true identity remains a mystery. DNA and fingerprint checks on Buckingham have drawn a blank. Strict privacy laws in Switzerland have hampered checks in the country, where Buckingham is believed to have a safety deposit box. Buckingham owns a house in Northampton but little else is known about him, least of all his true identity. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.