DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MO: Former IRS Employee Indicted For Taxpayer ID Theft, Tax Fraud Conspiracy

Posted on March 27, 2014 by Dissent

A former employee of the Internal Revenue Service is among three defendants who have been indicted for stealing taxpayers’ identity information in order to receive fraudulent tax refunds.

Taylor S. Knight, 32, and Michael J. Moore, 27, both of Kansas City, Mo., and Michael Stalcup, 42, of Farley, Mo., were charged in a six-count indictment returned under seal by a federal grand jury in Kansas City, Mo., on Tuesday, March 18, 2014. The indictment was unsealed and made public March 25th upon their arrests and initial court appearances.

According to the indictment, Knight worked as an employee of the IRS at the office at 333 W. Pershing Rd., Kansas City, from March 2009 to January 2012. Taylor allegedly abused her position of trust by accessing the information of three taxpayers without authorization.

On Sept. 30, 2011, Knight allegedly used the information from two of the victim taxpayers to submit a bogus online application for three prepaid debit cards. These debit cards were issued and mailed to the residence of Moore’s grandmother, the indictment says. Moore allegedly monitored the mail sent to his grandmother’s address and retrieved the three prepaid debit cards.

For one of the victim taxpayers, the indictment says, Knight submitted a bogus online application for a prepaid debit card that was approved and mailed to an address in Oak Grove, Mo.; this debit card was never used. The indictment alleges that Knight submitted this false online application to test whether her scheme to defraud the IRS was viable.

On Oct. 17, 2011, one of the conspirators allegedly submitted a 2010 tax return for two of the victim taxpayers, who were married and filed their taxes jointly. The IRS approved a $46,572 refund, the indictment says, of which $5,000 was deposited on a debit card that had been obtained by Knight. The IRS attempted to deposit the remaining $41,572 refund on the other debit cards obtained by Knight, according to the indictment, but the receiving banks rejected the deposits.

Moore allegedly telephoned the IRS and falsely claimed to be the victim. He allegedly provided the IRS representative pertinent personal identification information for both victims and requested the IRS to send the remaining tax refund to a new address located in Independence, Mo. Moore identified this address, the indictment says, because it was his former residence and he knew it was unoccupied.

In August 2011, the victim taxpayers filed legitimate amended tax returns. According to the indictment, a $46,734 refund check was sent to the Independence address. Moore allegedly received the refund check at his former residence and gave it to Knight. Knight allegedly paid Stalcup $500 to help her cash the refund check. Knight allegedly obtained false identification documents – including Social Security cards and driver’s licenses – so that she and Stalcup could assume the identity of the victim taxpayers. They attempted to cash the refund check at a local gas station, but the business refused and reported the incident to law enforcement.

The federal indictment charges Knight, Moore and Stalcup with participating in a conspiracy to defraud the United States by using the identification of genuine taxpayers to fraudulently induce the IRS into issuing tax refund payments based on false information submitted by co-conspirators.

In addition to the conspiracy, Knight and Moore are charged together with one count of the theft of government money, two counts of aggravated identity theft, one count of mail fraud and one count of the misuse of a Social Security number.

Dickinson cautioned that the charges contained in this indictment are simply accusations, and not evidence of guilt. Evidence supporting the charges must be presented to a federal trial jury, whose duty is to determine guilt or innocence.

This case is being prosecuted by Special Assistant U.S. Attorney Trey Alford. It was investigated by the Treasury Inspector General for Tax Administration.

SOURCE: U.S. Attorney’s Office, Western District of Missouri


Related:

  • Veradigm's Breach Claims Under Scrutiny After Dark Web Leak
  • UK: Woman charged after NHS patients' records accessed in data breach
  • Revealed: Afghan data breach after MoD official left laptop open on train
  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
Category: Government SectorID TheftInsiderU.S.

Post navigation

← Missouri Man Sentenced On Computer Hacking Charges
UK: Northamptonshire Police worker breached data law →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.