Feeds

Bogus Baron BOFH banged up

Phoney peer gets 21 months' imprisonment

High performance access to file storage

A phoney English Lord who stole a dead baby's identity to lead a fantasy life has been jailed for 21 months for passport fraud. 'Christopher Edward Buckingham' was sent to prison by a judge yesterday without revealing his true identity, after living 23 years under the assumed name.

The self-styled Earl of Buckingham married under this false name and fathered two children, whose nationality has now been called into question. He told his former wife Jody that his parents died in a plane crash in Egypt in 1982. The couple divorced in 1997.

The impostor's cover was blown after checks by the Passport Agency revealed he had stolen the identity of Christopher Edward Buckingham, an infant who died aged just eight months, in 1963. The ruse was copied from the one employed by the assassin in Frederick Forsyth’s novel The Day of the Jackal. Unlike that character "Buckingham" maintained an unremarkable life working as an IT security consultant for a Zurich-based Swiss insurance firm since 2001.

Buckingham's passport was revoked in 2003. He was arrested in January after routine checks by an alert immigration official in Calais showed he was travelling under fraudulent documentation. He was shipped back to the UK and charged with making a false passport application. He pleaded guilty to the offence at a hearing a Canterbury Crown Court last month.

Sentencing him on Tuesday, Judge Adele Williams said: "Someone does not assume a false identity unless there is a very good reason... You have shown a lack of remorse and have actively obstructed in revealing your true identity," he added

Detective Constable David Sprigg, the Kent Police officer who investigated the case, told The Daily Telegraph: "I think that he has got some dark secret that he is hiding and he doesn’t want us to know what it is." The mother of the real Christopher Buckingham, Audrey Wing, said the trial had brought back the agony of her baby son's untimely death during a caravan holiday in 1963.

Despite police appeals, Buckingham's true identity remains a mystery. DNA and fingerprint checks on Buckingham have drawn a blank. Strict privacy laws in Switzerland have hampered checks in the country, where Buckingham is believed to have a safety deposit box. Buckingham owns a house in Northampton but little else is known about him, least of all his true identity. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.