{"id":55760,"date":"2024-04-04T14:12:18","date_gmt":"2024-04-04T14:12:18","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35745\/Man-Pleads-Guilty-To-Stealing-Former-Coworkers-Identity-For-30-Years.html"},"modified":"2024-04-04T14:12:18","modified_gmt":"2024-04-04T14:12:18","slug":"man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/","title":{"rendered":"Man Pleads Guilty To Stealing Former Coworker&#8217;s Identity For 30 Years"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/GettyImages-1572927917-800x560.jpg\" alt=\"Man pleads guilty to stealing former coworker\u2019s identity for 30 years\"><figcaption class=\"caption\"><\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2024\/04\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">162<\/span> <\/a> <\/aside>\n<p> <!-- cache hit 422:single\/related:cee337a3a40b021cfa9581cf1c8f9ff4 --><!-- empty --><\/p>\n<p>A high-level Iowa hospital systems administrator, Matthew Kierans, has admitted to stealing a coworker&#8217;s identity and posing as William Donald Woods for more than 30 years, The Register <a href=\"https:\/\/www.theregister.com\/2024\/04\/03\/sysadmin_33_year_id_theft\/\">reported<\/a>.<\/p>\n<p>On top of using Woods&#8217; identity to commit crimes and rack up debt, Kierans&#8217; elaborate identity theft scheme led to Woods&#8217; incarceration after Kierans&#8217; accused his victim of identity theft and Los Angeles authorities failed to detect which man was the true William Donald Woods. Kierans could face up to 32 years in prison, The Register reported, and must pay a $1.25 million fine.<\/p>\n<p>According to a proposed <a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/US-v-Kierans-Notice-of-Intent-to-Plead-Guilty-4-1-2024.pdf\">plea agreement<\/a> with the US Attorney&#8217;s Office for the Northern District of Iowa, Kierans met Woods &#8220;in about 1988&#8221; when they worked together at a hot dog stand in New Mexico. &#8220;For the next three decades,&#8221; Kierans used Woods&#8217; &#8220;identity in every aspect of his life,&#8221; including when obtaining &#8220;employment, insurance, a social security number, driver&#8217;s licenses, titles, loans, and credit,&#8221; as well as when paying taxes. Kierans even got married and had a child using Woods&#8217; name.<\/p>\n<p>Kierans apparently hatched the scheme in 1990 when he was working as a newspaper carrier for the Denver Post. That&#8217;s when he first obtained an identification document in Woods&#8217; name. The next year, Kierans bought a vehicle for $600 using two checks in Woods&#8217; name, the plea agreement said. After both checks bounced, Kierans &#8220;absconded with the stolen vehicle to Idaho, where the car broke down and he abandoned it.&#8221; As a result, an arrest warrant was issued in Woods&#8217; name, while Kierans moved to Oregon and the whereabouts of the real Woods was seemingly unknown.<\/p>\n<p>Eventually in summer 2012, Kierans relocated to Wisconsin, researching Woods&#8217; family history on Ancestry.com and then fraudulently obtaining Woods&#8217; certified birth certificate from the State of Kentucky, seemingly to aid his job hunt. Sometime in 2013, Kierans was hired by a hospital in Iowa City to work remotely from Wisconsin as a &#8220;high level administrator in the hospital&#8217;s information technology department,&#8221; using Woods&#8217; birth certificate and a fictitious I-9 form to pass the hospital background check.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>Over the next decade, Kierans earned about $700,000 in that role, while furthering his identity theft scheme. Between 2016 and 2022, Kierans used Woods&#8217; name, Social Security number, and date of birth and &#8220;repeatedly obtained&#8221; eight &#8220;vehicle and personal loans&#8221; from two credit unions, each one totaling between $15,000 and $44,000.<\/p>\n<p>Woods only discovered the identity theft in 2019, when he was homeless and discovered that he inexplicably had $130,000 in debt to his name. Woods attempted to close bank accounts that Kierans had opened in Woods&#8217; name, and that&#8217;s when Kierans went on the defense, successfully pushing to get Woods arrested to conceal Kierans&#8217; decades of identity theft.<\/p>\n<h2>LAPD fails to detect true identity<\/h2>\n<p>In 2019, Woods walked into the branch of a national bank in Los Angeles, telling an assistant branch manager that &#8220;he had recently discovered that someone was using his credit and had accumulated large amounts of debt,&#8221; the plea agreement said.<\/p>\n<p>Woods presented his real Social Security card and an authentic state of California ID card, but the assistant branch manager became suspicious when Woods could not answer security questions that Kierans had set for the bank accounts.<\/p>\n<p>The bank employee called the phone number listed on the accounts, which was Kierans&#8217; number. At that point, Kierans correctly answered the security questions, and the assistant branch manager contacted the Los Angeles Police Department to investigate Woods.<\/p>\n<p>As a result of LAPD&#8217;s investigation\u2014which included contacting Kierans and reviewing Kierans&#8217; fraudulent documents, which at times used a different middle name\u2014Woods was arrested for unauthorized use of personal information. Subsequently, Woods was charged with committing felony crimes of identity theft and false impersonation, facing as much as three years&#8217; incarceration for each count.<\/p>\n<p>Woods continued insisting that he was the real victim of identity theft, while the California court system insisted he was actually Kierans. This continued until December 2019 when a state public defender told a court that Woods did not have the mental competency to stand trial. The court ordered Woods to be detained in a publicly funded California mental hospital until his mental competency improved, where he was given psychotropic medication in 2020.<\/p>\n<p>Ultimately, in March 2021, Woods was convicted of the felony charges and after his release, he was ordered to &#8220;use only&#8221; what California decided was his &#8220;true name, Matthew Kierans.&#8221; In total, Woods spent 428 days in jail and 147 days in a mental hospital because California officials failed to detect his true identity.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35745\/Man-Pleads-Guilty-To-Stealing-Former-Coworkers-Identity-For-30-Years.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55761,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5172],"class_list":["post-55760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinebankcybercrimefraudidentity-theft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Man Pleads Guilty To Stealing Former Coworker&#039;s Identity For 30 Years 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Man Pleads Guilty To Stealing Former Coworker&#039;s Identity For 30 Years 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-04T14:12:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/GettyImages-1572927917-800x560.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Man Pleads Guilty To Stealing Former Coworker&#8217;s Identity For 30 Years\",\"datePublished\":\"2024-04-04T14:12:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/\"},\"wordCount\":765,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years.jpg\",\"keywords\":[\"headline,bank,cybercrime,fraud,identity theft\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/\",\"name\":\"Man Pleads Guilty To Stealing Former Coworker's Identity For 30 Years 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years.jpg\",\"datePublished\":\"2024-04-04T14:12:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years.jpg\",\"width\":800,\"height\":560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,bank,cybercrime,fraud,identity theft\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinebankcybercrimefraudidentity-theft\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Man Pleads Guilty To Stealing Former Coworker&#8217;s Identity For 30 Years\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Man Pleads Guilty To Stealing Former Coworker's Identity For 30 Years 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/","og_locale":"en_US","og_type":"article","og_title":"Man Pleads Guilty To Stealing Former Coworker's Identity For 30 Years 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-04-04T14:12:18+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/04\/GettyImages-1572927917-800x560.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Man Pleads Guilty To Stealing Former Coworker&#8217;s Identity For 30 Years","datePublished":"2024-04-04T14:12:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/"},"wordCount":765,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years.jpg","keywords":["headline,bank,cybercrime,fraud,identity theft"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/","url":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/","name":"Man Pleads Guilty To Stealing Former Coworker's Identity For 30 Years 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years.jpg","datePublished":"2024-04-04T14:12:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years.jpg","width":800,"height":560},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/man-pleads-guilty-to-stealing-former-coworkers-identity-for-30-years\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,bank,cybercrime,fraud,identity theft","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinebankcybercrimefraudidentity-theft\/"},{"@type":"ListItem","position":3,"name":"Man Pleads Guilty To Stealing Former Coworker&#8217;s Identity For 30 Years"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55760"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55760\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55761"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}