DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Twenty Million Dollar Stolen Identity Refund Fraud Ring Indicted

Posted on May 22, 2014 by Dissent

Montgomery, Alabama – Tracy Mitchell, of Phenix City, Alabama; Dameisha Mitchell, of Phenix City, Alabama; Latasha Mitchell, of Phenix City, Alabama; Keisha Lanier, of Seale, Alabama; Sharondra Johnson, of Phenix City, Alabama; Cynthia Johnson, of Phenix City, Alabama; Mequetta Snell-Quick, of Phenix City, Alabama; Talarious Paige, of Phenix City, Alabama; and Patrice Taylor, of Midland, Georgia were indicted for their roles in a $20 million dollar Stolen Identity Refund Fraud (“SIRF”) conspiracy, announced Assistant Attorney General Kathryn Keneally of the Justice Department’s Tax Division and U.S. Attorney George L. Beck Jr. for the Middle District of Alabama following the unsealing of the superseding indictment.

According to the Superseding Indictment, between January 2011 and December 2013, the Defendants ran a large-scale identity theft ring in which they filed over 7,000 false tax returns that claimed in excess of $20 million in fraudulent claims. The Defendants obtained stolen identities from various sources to be used in filing false returns. Tracy Mitchell worked at the hospital at Fort Benning, Georgia. As a hospital employee, Mitchell had access to the identification data of military personnel, including soldiers who were deployed to Iraq and Afghanistan. Tracy Mitchell and her daughter, Latasha Mitchell, also obtained stolen identities from an Alabama state agency. Keisha Lanier obtained stolen identities from the Alabama Department of Corrections. Talarious Paige and Patrice Taylor worked in a call center for a Columbus, Georgia company and stole identities. Paige, in turn, sold those identities and they were used by Tracy Mitchell, Keisha Lanier, and others to file false tax returns.

In order to file tax returns, according to the Superseding Indictment, the Defendants obtained several Electronic Filing Numbers (“EFIN”) in the names of sham tax businesses. On behalf of those sham tax businesses, the Defendants applied for bank products from various financial institutions, which mailed blank check stock to the Defendants’ homes. Tracy Mitchell, Latasha Mitchell, Keisha Lanier, Mequetta Snell-Quick, and others used the sham tax businesses and stolen identities to file false tax returns.

Furthermore, according to the Superseding Indictment, the Defendants directed anticipated tax refunds to prepaid debit cards, to U.S. Treasury Checks, and to financial institutions which in turn issued the refunds via checks or prepaid debit cards. As to the refunds sent through the financial institutions, the Defendants simply printed out the refund checks from the check stock sent to them. Regarding the U.S. Treasury Checks, the Defendants directed those checks to be mailed to several addresses in Alabama and then obtained them from the mail. To coordinate the cashing of the refund checks, the Defendants sent various text messages between themselves. The Defendants cashed the fraudulent checks at several businesses located in Alabama, Georgia, and Kentucky. In addition to the conspiracy charge, the defendants are also charged with mail and wire fraud, access device fraud, and aggravated identity theft.

“To steal the identity of a soldier serving his/her country is the lowest form of thievery,” stated U.S. Attorney Beck. “If a soldier serving his country is not safe from identity theft, then none of us are safe from this crime. We will continue our efforts to stamp out this crime. Identity theft affects too many people in our communities and we must use all available resources under the law to destroy it. I want to commend the IRS Criminal Investigations Unit and the U.S. Army Criminal Investigation Command for their dedication to destroying this criminal organization.”

Daniel Andrews, the director of the U.S. Army Criminal Investigation Command’s Computer Crime Investigative Unit stated, “Today’s indictments are not only a strong testament to our unwavering commitment to aggressively pursue cases of identity theft and protect the men and women serving this nation, but also our equal commitment to work shoulder-to-shoulder with other law enforcement agencies and the DOJ in helping to bring those to justice who commit cyber-crime and identity theft while stealing from the American taxpayer.”

“Identifying, investigating and vigorously prosecuting those individuals involved in tax related identity theft schemes, remains a top priority for IRS Criminal Investigation,” stated Veronica F. Hyman-Pillot, Special Agent in Charge with IRS Criminal Investigation. “These indictments and arrests are just a sample of what is to come as we join forces with our law enforcement partners and the United States Attorney’s office to put an end to identity theft.”

“The problem with identity theft is that the victims don’t know they have been subjected to the crime until well after the fact,” said U.S. Attorney for the Middle District of Georgia, Michael Moore. “The prosecution of this case resulted from the great work of the U.S. Attorney in Montgomery and the Tax Division. I hope it sends a message to both our soldiers and to those who try to take advantage of them – while you are protecting us from bad guys abroad, we will be protecting you from the bad guys at home.”

An indictment merely alleges that crimes have been committed and the defendant is presumed innocent until proven guilty beyond a reasonable doubt. If convicted, each defendant faces a maximum potential sentence of 10 years in prison for the conspiracy charge, a maximum potential sentence of 20 years in prison for each wire and mail fraud count, a maximum potential sentence of 15 years in prison for each access device fraud count, and a mandatory two-year sentence for each aggravated identity theft count. The defendants are also subject to fines, forfeiture, and mandatory restitution if convicted.

The case was investigated by special agents of the Internal Revenue Service – Criminal Investigation and the Computer Crimes Investigative Unit of the U.S. Army Criminal Investigation Command. Trial Attorney Michael Boteler of the Department’s Tax Division and Assistant United States Attorney Todd Brown of Alabama are prosecuting the case. The United States Attorney’s Office for the Middle District of Georgia provided assistance in this matter.

SOURCE: U.S. Attorney’s Office, Middle District of Alabama


Related:

  • Maintenance Note
  • CISA Alert: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
  • System Status Note
  • System Status Note
  • Fraudster's fake data breach claims should remind media to be careful what we report
  • "Pompompurin" taken into custody after violating conditions of pre-sentencing release on bond (1)
Category: Uncategorized

Post navigation

← eBay argued against stronger privacy breach penalties
So how’s eBay doing on breach response so far? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • BlackSuit ransomware site seized as part of Operation Checkmate
  • The day after XSS.is forum was seized, it struggles to come back online — but is it really them?
  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders
  • Paying cyberattackers is wrong, right? Should Taos County’s incident be an exception? (1)
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.