Tuesday, October 14, 2025

Laptop thieves used fake IDs, QR codes to pick up goods – NBC Los Angeles

Must read

Introduction to Laptop Theft Scheme

Two men linked to at least eight fraud cases involving the theft of laptops with the use of fake identification and QR codes have been arrested, investigators announced.

A pair of men impersonated actual customers who purchased laptops at Apple stores and other businesses by using fraudulent IDs and bogus QR codes, according to the Glendale Police Department.

Method of Operation

Paul Giles said he was a victim of one of these scams. He wasn’t aware until he tried to pick up his purchase at the Americana at Brand. “From the time I got the initial email from Apple saying it’s ready to pick up and the time that they actually went to the store to pick it up,” Giles said. The victim said the theft happened in a matter of about four hours. “It was someone who impersonated me. Showed the ID, showed the QR code that was through the email system and with that, ‘Paul Giles’ got the laptop,” Giles said.

How Thieves Obtain Information

Giles said a detective later informed him that thieves buy information and are told where to go to pick up goods. “It’s really easy to get this information,” said Jim Stickley, a cybersecurity expert. “You can jump on the dark web. There’s sites that are literally dedicated to selling just these types of information." Stickley added that oftentimes, victims are unaware that their emails have been compromised. “Everything’s in the cloud now, so they’ll access your email,” he said. “So once they gain access, they’ll just put a rule in that basically forwards all of your emails. So now you get a copy and they get a copy and you’d have no idea.”

Investigation and Arrests

Police did not release the names of the men who were arrested in connection with the scheme. The department said they’re searching for a third individual, but did not provide a detailed description of that person. The arrests were made after an investigation into the series of laptop thefts, which involved the use of fake IDs and QR codes to impersonate legitimate customers.

Conclusion

The case highlights the importance of being vigilant when it comes to online security and protecting personal information. It also underscores the need for businesses to have robust security measures in place to prevent such scams. As cybersecurity expert Jim Stickley noted, it is relatively easy for thieves to obtain personal information, making it essential for individuals to be proactive in protecting themselves.

FAQs

Q: How did the thieves obtain the personal information of the victims?
A: The thieves bought the information on the dark web, where sites sell such information.
Q: How did the thieves use the QR codes to pick up the laptops?
A: The thieves used bogus QR codes, which were sent to them through the email system, to impersonate the legitimate customers.
Q: What can individuals do to protect themselves from such scams?
A: Individuals can protect themselves by being cautious when sharing personal information online and by monitoring their email accounts for any suspicious activity.
Q: Are the police still investigating the case?
A: Yes, the police are still searching for a third individual in connection with the scheme.

- Advertisement -spot_img

More articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisement -spot_img

Latest article