Search TorWire

Find cybersecurity guides and research articles

Home > News > Deep Web > Stolen Identities, Rented Cars: U.S. Fraud Scheme Highlights Dark Web’s Criminal Utility

Stolen Identities, Rented Cars: U.S. Fraud Scheme Highlights Dark Web’s Criminal Utility

By: Morgan Cipher Senior Privacy Journalist

Last updated: February 5, 2026

Human Written
Stolen Identities, Rented Cars: U.S. Fraud Scheme Highlights Dark Web’s Criminal Utility
  • A Pittsburgh (City in Pennsylvania, US) man faces over a decade in prison for running a fraud scheme using stolen identities.

  • The operation used dark web credit card numbers to rent approximately 100 vehicles.

  • An insider at a rental location helped the group bypass security to steal the cars.

Pittsburgh Man Pleads Guilty in Dark Web–Linked Car Rental Fraud Scheme

A Pittsburgh man’s high-tech scam has hit a dead end. He turned the dark web and a complicit employee into an illegal car rental business.

He may spend more than ten years in a federal prison for this crime. The connection between local crime and international internet crimes has been proven by this case.

The Scheme Involving a Dark Web Market for Vehicles

Prosecutors charged 32-year-old William Knight with access device fraud and identity fraud. Knight pleaded guilty in a federal court presided over by District Judge Marilyn J. Horan. U.S. Attorney Troy Rivetti announced the plea.

The group ran the operation with surprising organization. Knight and his co-conspirators didn’t shop for normal goods online. They went shopping on the dark web for stolen credit card numbers. They also bought the personal data of real people—utilizing the same hidden ecosystem that hosts large-scale criminal enterprises, such as the Empire Market dark web drug site, whose operator recently pleaded guilty.

But this wasn’t about buying gift cards or electronics. They had a bigger, more audacious plan. They teamed up with what court documents call a “complicit” employee at a car rental location.

This insider was key. They helped Knight’s group bypass standard rental security checks. Using the stolen credit card data, they fraudulently rented out roughly 100 different vehicles.

The Operation: An Illegal Rental Business

So what did they do with all those cars? They essentially started their own rogue rental company. Knight and his crew used some of the vehicles for themselves.

However, the group sub-leased many of them to other individuals. This created a second-hand, illegal rental market. The operators built the entire business on stolen identities and fake transactions.

The entire operation ended when authorities brought Knight’s case before the U.S. courts, District Judge Marilyn J. Horan. Knight pleaded guilty to two counts of felony on February 2, and Judge Horan set the day for his sentencing for May 20, 2026.

Possible Consequences of Knight’s Offenses

Based on statutory law regarding crimes of this nature, Knight could be subject to significant punishment. The court may sentence him to up to twelve years in prison and order him to pay as much as $500,000 in damages for his actions.

The court will take a number of factors into consideration to establish an appropriate sentence for Knight. These factors will include, but not be limited to, the severity of each of the crimes alleged and Knight’s criminal history (if any).

Brendan T. Conway is the Assistant U.S. Attorney in charge of Knight’s case, and the US Secret Service was the investigating agency. The agency often handles investigations that have to do with complex financial and cyber crimes.

This guilty plea wraps up a significant local case. It clearly connects street-level crime in Pittsburgh to the shadowy global economy of the dark web. This economy fuels diverse crimes worldwide, from fraudulent schemes like this one to dark web drug sales, as seen in the recent arrest by New South Wales Police. It proves that even with digital tools and anonymous markets, law enforcement can follow the trail.

Share this article

About the Author

Morgan Cipher

Morgan Cipher

Senior Privacy Journalist

Morgan combines a journalist’s curiosity with a security specialist’s precision. His reporting on data breaches, privacy laws, and encryption tech has been featured in several tech publications. At TorWire, he focuses on real-world threats and how to counter them, always with an eye on what’s next in digital privacy.

Comments (0)

No comments.