DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WA: Suspected ID thief may have over 1,000 victims

Posted on January 8, 2011 by Dissent

Drew Mikkelsen reports:

An Olympia man arrested Thursday may have planned to steal the identities of 1,000 people, said Thurston County Sheriff John Snaza.

Anthony Vaughn is held on 50 counts of identity theft at the Thurston County Jail. A veteran detective said Vaughn was likely part of the largest identity theft ring in county history.

According to court documents, Vaughn admitted to detectives he stole the items to support a drug habit.
Detectives seized 40 boxes of evidence from Vaughn’s Olympia home.

Police said Vaughn had the names and social security numbers of hundreds of employees with the State’s Employment Security Division.

Those names were apparently on paperwork stolen from a car parked on the state Capitol campus last year.
Sheriff Snaza said contacting all the victims could take more than six months.

Read more on NWCN.

I am not aware of the breach last year, as I do not see any such theft reported on this blog. The only breach that seems similar was one involving an employee of the Washington Department of Corrections, where papers were stolen from an employee’s car, but that car was not on the state Capitol campus at the time of the theft.

But why should it take over 6 months to notify those whose records were found? These were hundreds of employees who should be in the state’s employee database. It really shouldn’t take that long.

No related posts.

Category: Government SectorID TheftPaperTheftU.S.

Post navigation

← OH: Second suspect in Zanesville nail salon raid turns self in
TN: Ex-deputy sentenced to 34 months in prison for ID theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.