Feeds

Man cops to $1m phony bar code shoplifting scheme

TJTMiss's stellar eBay rating

Top 5 reasons to deploy VMware with Tegile

An Ohio man has admitted heading a conspiracy that netted more than $1m by using phony Universal Product Code labels to acquire store merchandise and then selling the booty on eBay.

Tommy Joe Tidwell, 35, of Dayton, Ohio, pleaded guilty to three felony counts, including conspiracy to use unauthorized access devices, use of unauthorized access devices and mail and wire fraud. He faces a maximum prison sentence of 40 years. Sentencing is scheduled for January.

According to prosecutors, Tidwell created fraudulent UPC bar code labels on his home PC and then directed conspirators to place them on goods being sold in stores in Ohio, Illinois, Indiana, Pennsylvania, and Texas. The doctored labels allowed the conspirators to buy the items for a fraction of the real price.

Tidwell then sold the items on eBay, using the user id TJTMiss.

He is the second defendant in the case to plead guilty. David J. Lombardo, 44, pleaded guilty in September to one count of conspiracy to use unauthorized access devices and one count of use of unauthorized access devices. Charges are still pending against two others accused of taking part in the conspiracy.

As was the case with an airport baggage handler charged with stealing passengers' stuff, Tidwell's eBay account enjoyed a stellar reputation. Out of 522 comments left, only four were negative, giving him a positive feedback rating of 99.2.

Typical of the remarks was this one: "Excellent product!!! Great Price!! and Fast Shipping. Highly Recomend!!!"

The score would probably be higher were it not for the work of the FBI and local law enforcement. On July 2, one eBay buyer complained: "Never answered e-mails,never shipped item, had to complain to get money back." Exactly one week later, Tidwell was indicted. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.