DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Nine Defendants Plead Guilty in $20 Million Stolen Identity Refund Fraud Ring

Posted on April 1, 2015 by Dissent

There’s a follow-up to a case previously reported on PHIprivacy.net and on this site. From the U.S. Department of Justice:

Alabama and Georgia residents pleaded guilty for their roles in a $20 million stolen identity refund fraud (SIRF) conspiracy, Acting Assistant Attorney General Caroline D. Ciraolo of the Justice Department’s Tax Division and U.S. Attorney George L. Beck Jr. of the Middle District of Alabama announced today.

The defendants pleaded guilty on the following dates to the following charges:

  • Talarius Paige on March 31, to one count of conspiracy to file false claims and one count of aggravated identity theft;
  • Tracy Mitchell on March 30, to one count of conspiracy to file false claims, one count of wire fraud and one count of aggravated identity theft;
  • Latasha Mitchell on March 30, to one count of conspiracy to file false claims and one count of aggravated identity theft;
  • Demeisha Mitchell on March 26, to one count of conspiracy to file false claims and one count of aggravated identity theft;
  • Keisha Lanier on March 5, to one count of wire fraud and one count of aggravated identity theft;
  • Sharondra Johnson on Feb. 17, to one count of conspiracy to file false claims;
  • Cynthia Johnson on Dec. 17, 2014, to one count of conspiracy to file false claims; and
  • Patrice Taylor on July 18, 2014, to one count of conspiracy to file false claims.

The defendants are scheduled to be sentenced on June 30.

Mequetta Snell-Quick, another co-conspirator, is scheduled to appear in court on April 6.  In a related case, on Oct. 2, 2014, Tamika Floyd pleaded guilty to one count of conspiracy to file false claims and one count of aggravated identity theft and is scheduled to be sentenced on May 19.  The defendants each face a statutory maximum sentence of 10 years in prison for each count of conspiracy to file false claims, a statutory maximum sentence of 20 years in prison for each wire fraud count, and a statutory mandatory minimum sentence of two years in prison for each aggravated identity theft count.

“The guilty pleas of the nine defendants who participated in this conspiracy send a clear message that the Tax Division, along with its law enforcement partners, will vigorously pursue and prosecute individuals involved at every level of these extensive criminal schemes,” stated Acting Assistant Attorney General Ciraolo.  “The division will seek significant jail time and restitution from offenders who choose to victimize unsuspecting American taxpayers, including the dedicated men and women serving in the U.S. military, and steal from the U.S. Treasury.”

“Stealing a person’s identity is a horrendous crime,” said U.S. Attorney Beck.  “It can take months or years for a victim of identity theft to correct the damage that these criminals reaped upon him or her.  But these defendants stole identities from military men and women who have volunteered to protect our country.  That is inexcusable and will not be tolerated.”

According to court documents, between January 2011 and December 2013, the defendants ran a large-scale identity theft ring in which they filed more than 7,000 false tax returns that included fraudulent claims for refunds in excess of $20 million.  In order to file false returns, the defendants obtained stolen identities from various sources.  Tracy Mitchell worked at a military hospital located at Fort Benning, Georgia, and as a hospital employee, she had access to the identification data of military personnel, including soldiers who were deployed to Afghanistan.  Tracy Mitchell stole soldiers’ personal information and used that information to file false tax returns.

“This case is an excellent example of Army CID working shoulder-to-shoulder with our fellow law enforcement partners to protect the nation’s soldiers,” said Director Daniel Andrews of the U.S. Army Criminal Investigation Command’s (CID) Computer Crime Investigative Unit.  “It demonstrates our vigilance against cybercrime and an unswerving commitment to dismantle criminal operations impacting the U.S. Army.”

Floyd stole personal information from two Alabama state agencies and provided those names to Lanier.  Lanier provided those names to Tracy Mitchell, Latasha Mitchell, Paige and others for use in filing false tax returns.  Lanier also obtained stolen identities from the Alabama Department of Corrections that were then used to file false tax returns.  Also, Paige and Taylor worked in a call center for a Columbus, Georgia, company and stole identities from that company.  Paige, in turn, used those identities to file false tax returns and filed some of the returns from Tracy Mitchell’s residence.

In order to file the false tax returns, Floyd applied for and obtained several Electronic Filing Numbers (EFINs) from the Internal Revenue Service (IRS) in the names of sham tax businesses.  The tax refunds claimed on the false returns were paid via U.S. Treasury checks mailed to addresses under the control of participants in the scheme, prepaid debit cards issued by financial institutions, and deposits to financial institutions connected to the business EFINs so that the defendants could print refund checks.

The defendants cashed the tax refund checks at several businesses located in Alabama, Georgia and Kentucky.  Sharondra Johnson worked at the Walmart money center in Columbus, Georgia, and as part of her employment, she cashed checks for customers of the money center.  Demeisha Mitchell approached Sharondra Johnson about cashing tax refund checks issued in the names of other individuals.  Sharondra Johnson agreed to cash these refund checks and was paid a fee for her role in the scheme.

“Taking advantage of innocent citizens, especially service members and their families, is disgraceful,” said Chief Richard Weber of IRS Criminal Investigation (CI).  “IRS Criminal Investigation is committed to stopping those who would prey on others by stealing their identities.  As criminals continue to become more sophisticated, we will continue to work with our law enforcement partners to bring them to justice.”

Acting Assistant Attorney General Ciraolo and U.S. Attorney Beck Jr. commended special agents of IRS – CI and the U.S. Army – CID, who investigated the case, and Trial Attorneys Michael C. Boteler and Gregory P. Bailey of the Tax Division and Assistant U.S. Attorney Todd A. Brown of the Middle District of Alabama, for prosecuting the case.  Ciraolo and Beck Jr. also thanked the U.S. Attorney’s Office of the Middle District of Georgia for their assistance in the case.


Related:

  • Revealed: Afghan data breach after MoD official left laptop open on train
  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
Category: Business SectorGovernment SectorHealth DataID TheftInsiderU.S.

Post navigation

← Fourth Member of International Computer Hacking Ring Pleads Guilty to Hacking and Intellectual Property Theft Conspiracy
Officials say advanced hack was hoax in charging twin brothers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.