Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Kentucky Man Sentenced for Faking His Own Death By Hacking Into Government Sites

    Kentucky Man Sentenced for Faking His Own Death By Hacking Into Government Sites

    August 21, 2024

    A Kentucky man’s elaborate plot to fake his own death and escape his child support obligations has landed him in federal prison.

    On Monday, U.S. District Judge Robert Wier sentenced Jesse Kipf, 39, of Somerset, to 81 months behind bars following a plea agreement for computer fraud and aggravated identity theft. Kipf had a previous record of criminal history and had been described by his attorney as a troubled Iraq war veteran.

    Kipf’s Cyber Scheme to Dodge Child Support

    Kipf’s scheme began in January 2023, when he hacked into the Hawaii Death Registry System using a stolen username and password. He created a fake death certificate, listing himself as the medical certifier and using a doctor’s digital signature. This malicious act resulted in Kipf being registered as a deceased person in numerous government databases.

    But Kipf’s crimes went beyond faking his own death. He also infiltrated other states’ death registry systems, private business networks, and governmental and corporate networks, using stolen credentials. He then attempted to sell access to these networks on the dark web, an underground internet platform notorious for illicit activities.

    Kipf’s actions were motivated, in part, by a desire to avoid paying his outstanding child support obligations. According to court documents, he owed over $116,000 to his daughter and her mother. By faking his own death, Kipf hoped to escape his financial responsibilities.

    “This scheme was a cynical and destructive effort, based in part on the inexcusable goal of avoiding his child support obligations,” said U.S. Attorney Carlton S. Shier, IV.

    Troubling Criminal History and Consequences

    Kipf’s sentencing memo painted a picture of a serial offender with a concerning criminal history. In 2010, he was convicted in Nebraska on charges that included criminal possession of financial transaction devices. He also has pending charges in Kentucky related to using stolen credit card information to pay for food deliveries.

    According to his attorney, Tommy Miceli, Kipf’s criminal behavior stemmed from a struggle with drug addiction that worsened after his military service in the Iraq War from 2007-2008. Miceli argued this history should be taken into account, but the judge ultimately sided with prosecutors’ recommendation of an 81-month sentence.

    In a joint statement, law enforcement officials said Kipf’s case serves as a stark reminder of the damage that can be done by criminals exploiting technology.

    “Working in collaboration with our law enforcement partners, this defendant who hacked a variety of computer systems and maliciously stole the identity of others for his own personal gain, will now pay the price,” said Michael E. Stansbury, Special Agent in Charge of the FBI’s Louisville Field Office.

    The investigation into Kipf’s crimes was a collaborative effort involving the FBI, the Kentucky Attorney General’s Office, the Department of the Attorney General in Hawaii, and the Pulaski County Sheriff’s Office. Assistant U.S. Attorney Kate Dieruf led the prosecution, focusing on Kipf’s concerning criminal history and his “classic recidivist profile.”

    Along with the 81 months in prison, Kipf’s sentence, which he will serve 85% of, includes three years of supervised release. He must also pay $195,758.65 to cover the damages to government and corporate computer systems, as well as his outstanding child support obligations.

    Earlier in 2022, after six years of being on the run, an Iowa man who had faked his own death and removed his ankle monitor had been found and arrested over a thousand miles away from his grandmother’s home. The individual had been wanted by authorities for trial on charges associated with child sexual abuse imagery.

    According to nydefensecouncil.com, there are no specific laws against faking one’s own death within the United States. However, individuals and those involved in aiding such schemes could potentially face charges of identity theft, life insurance fraud, tax evasion, conspiracy and false reporting.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleThe AI Fix #12: AI made from human brain cells, and is there life after death?
    Next Article Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48187 – RAGFlow Authentication Bypass

    May 17, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    North Korean Cyber Fraud Scheme Targets U.S. Firms, DOJ Indicts Five Individuals

    Development

    Warm butt or cool butt? Razer’s latest gaming chair concept lets you choose

    News & Updates

    Announcing CodeQL Community Packs

    Development

    NVIDIA driver issues branded “absolutely abhorrent and completely embarrassing” — Gamers Nexus replicates bugs plaguing PC gamers

    News & Updates

    Highlights

    Machine Learning

    Cost-effective AI image generation with PixArt-Σ inference on AWS Trainium and AWS Inferentia

    May 14, 2025

    PixArt-Sigma is a diffusion transformer model that is capable of image generation at 4k resolution.…

    Fruit Credits – keep plain text accounts

    January 11, 2025

    Tips from 8 months of TanStack/Router in production

    August 14, 2024

    Automate Amazon RDS credential rotation with AWS Secrets Manager for primary instances with read replicas

    March 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.