DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Pulaski County Man Sentenced for Cyber Intrusion and Aggravated Identity Theft

Posted on August 23, 2024 by Dissent

LONDON, Ky. – A Somerset, Ky., man, Jesse Kipf, 39, was sentenced to 81 months on Monday by U.S. District Judge Robert Wier, for computer fraud and aggravated identity theft.

According to his plea agreement, Kipf intentionally accessed a computer without authorization and then obtained information from a protected computer for his own private gain and in furtherance of identity theft.  Specifically, in January 2023, Kipf accessed the Hawaii Death Registry System, using the username and password of a physician living in another state, and created a “case” for his own death.  Kipf then completed a State of Hawaii Death Certificate Worksheet, assigned himself as the medical certifier for the case and certified his death, using the digital signature of the doctor.  This resulted in Kipf being registered as a deceased person in many government databases.  Kipf admitted that he faked his own death, in part, to avoid his outstanding child support obligations.

Kipf also infiltrated other states’ death registry systems, private business networks, and governmental and corporate networks using credentials he stole from real people.  He then tried to sell access to these networks to potential buyers on the dark net, an overlay network within the internet that can only be accessed with specific software, configurations, or authorization and is commonly associated with the sale of illicit goods and services.

“This scheme was a cynical and destructive effort, based in part on the inexcusable goal of avoiding his child support obligations,” said Carlton S. Shier, IV, United States Attorney for the Eastern District of Kentucky.  “This case is a stark reminder of how damaging criminals with computers can be, and how critically important computer and online security is to us all.  Fortunately, through the excellent work of our law enforcement partners, this case will serve as a warning to other cyber criminals, and he will face the consequences of his disgraceful conduct.”

“Working in collaboration with our law enforcement partners, this defendant who hacked a variety of computer systems and maliciously stole the identity of others for his own personal gain, will now pay the price,” said Michael E. Stansbury, Special Agent in Charge, FBI, Louisville Field Office. “Victims of identity theft face lifelong impact and for that reason, the FBI will pursue anyone foolish enough to engage in this cowardly behavior.”

Under federal law, Kipf must serve 85 percent of his prison sentence.  Upon his release from prison, he will be under the supervision of the U.S. Probation Office for three years.  The damage to governmental and corporate computer systems and his failure to pay his child support obligations amounted to a total of $195,758,65.

United States Attorney Shier and Special Agent in Charge Stansbury; Russell Coleman, Attorney General of Kentucky; Anna E. Lopez, Attorney General for Hawaii; and Sheriff Bobby Jones, Pulaski County Sherriff’s Office, jointly announced the sentence.

The investigation preceding the indictment was conducted by FBI Louisville, Kentucky Attorney General’s Office, Department of the Attorney General for Hawaii, and the Pulaski County Sheriff’s Office.  Assistant U.S. Attorney Kate Dieruf prosecuted the case on behalf of the United States.

Source: U.S. Attorney’s Office, Eastern District of Kentucky

Updated August 20, 2024

Category: HackID TheftU.S.

Post navigation

← Privacy group fights European Parliament over ‘massive’ HR data breach
Alleged member of Karakurt extradited and charged in Ohio →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.
  • Websites selling hacking tools to cybercriminals seized
  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database
  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.