DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FL: Former employee convicted of stealing identity info of over 500 people from DCF computers for purposes of Medicare fraud

Posted on September 15, 2011 by Dissent

A jury returned a verdict of guilty on September 12, 2011 against Yenky Sanchez, 25, of Miami. Sanchez was found guilty on one count of conspiracy to commit health care fraud, one count of conspiracy to commit authentication feature fraud, and ten counts of aggravated identity theft. The guilty verdict against Sanchez follows on the heels of the guilty plea by his co-conspirator, Raul Lazaro Diaz-Perera, 43, of Miami, for the same charges.

According to the evidence at trial against Sanchez, and in the factual proffer filed with the court during Diaz-Perera’s plea hearing, Diaz-Perera was a former supervisor at the Florida Department of Children and Families’ call center in downtown Miami. On the day he was fired, October 28, 2010, Diaz-Perera negotiated with a cooperating subject to sell the Medicare numbers of elderly and disabled Floridians who had applied to DCF for food stamps, cash benefits, and Medicaid. The intent was for those numbers to be used to fraudulently bill Medicare for services that were never provided to the DCF beneficiaries. Diaz-Perera obtained the Medicare numbers from the DCF computer system through a contact he had at DCF.

That contact was defendant Yenky Sanchez, who was then working as an employee at DCF’s call center in downtown Miami. Sanchez used his access to the DCF internal computer system to obtain the names, addresses, telephone numbers, dates of birth, Social Security numbers, and Medicare numbers of 148 elderly and disabled Floridians. Sanchez then gave the personal identification information to Diaz-Perera, who sold it to the cooperating subject on December 15, 2010.

Diaz-Perera negotiated a second time with the cooperating subject to sell additional Medicare numbers. Diaz-Perera again turned to Sanchez to obtain the numbers. Sanchez again used his access to the DCF computer system to steal the names and other identification information, including Medicare numbers of more than 400 beneficiaries. Sanchez then gave these additional numbers to Diaz-Perera, who attempted to sell it to the cooperating subject on January 18, 2011.

On June 30, 2011, U.S. District Court Judge Cecilia M. Altonaga sentenced Diaz-Perera to 36 months in prison, to be followed by three years of supervised release. Sentencing for Sanchez is scheduled for November 21, 2011. At sentencing, Sanchez faces a maximum of ten years in prison on the health care fraud charge, five years on the authentication feature fraud charge, and two years each for the aggravated identity theft charges.

Source: U.S. Attorney’s Office, Southern District of Florida


Related:

  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Kaufman County's data breach was their second one in three weeks
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Breach IncidentsGovernment SectorID TheftInsiderU.S.

Post navigation

← UK: Eastern and Coastal Kent Primary Care Trust loses CD with 1.6 million patients’ information
Service Members’ Identities Stolen Via File-Sharing Used for Fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.