DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Two City Of Miami Police Officers And One State Corrections Officer Arrested And Charged For Selling Identity Info for Tax Refund Fraud Schemes

Posted on March 8, 2013 by Dissent

Law enforcement in Miami has its hands full investigating tax refund fraud schemes. It doesn’t help when three law enforcement officers are involved in those schemes.

Bernard Beliard, a Florida Department of Corrections  officer assigned to the South Florida Reception Center,  and Vital Frederick and Malinzky Bazile –  two Miami Police Department officers – were arrested yesterday and charged in three separate complaints with fraud and extortion offenses. One complaint charges Bernard Beliard with access device fraud and aggravated identity theft. The second complaint charges Vital Frederick with extortion under color of official right, access device fraud, and aggravated identity theft. The third complaint charges Malinsky Bazile with access device fraud, use of a computer to facilitate the access device fraud, and aggravated identity theft.

According to the allegations, the defendants used their official law enforcement position to access personal identifying information, including names, dates of birth, and social security numbers of individuals, which they then sold to others. In Belliard’s case, he is accused of selling State of Florida Department of Corrections Daily Intake Lists that included 805 names, dates of birth, and Social Security numbers of inmates at the South Florida Reception Center (SFRC) to an FBI confidential source. When confronted by an FBI agent after the fourth transaction, Belliard handed over the cash he had just received. He also admitted to selling the lists and to knowing that they would be used for tax refund fraud.

Bazile and Frederick allegedly misused their access to the D.A.V.I.D. (DAVID) driver’s license database to find identity information to be used for tax refund fraud. Bazile allegedly systematically ran searches on the database for women in a particular age range, e.g., he would run a search on DAVID for females in Florida aged 57 to 61 with first names beginning with “A” and last name “Martinez.” Bazile screened the profiles of over 1,000 people from his targeted searches. Within days of his searches, the IRS received fraudulent returns in some of those names.

Caught after Internal Affairs installed a keylogger on his laptop and he was photographed withdrawing money from ATMs using debit cards issued for the fraudulent tax refunds, Bazile “signed a written confession where he admitted (1) that he used DAVID on his MPD-issued computer to find personal information of victims to file fraudulent tax returns; (2) that he withdrew money from pre-paid debit cards loaded with fraudulent tax refunds of these victims at ATMs; and (3) that he made approximately $130,000 to $140,000 in 2011 and 2012 from the scheme.

Frederick also allegedly misused his access to the DAVID database and provided a confidential source with 52 individuals’ identity information in two separate transactions. In his case, the identity information sale seemed secondary to a bigger role he allegedly played in protecting a courier for a check-cashing service involving fraudulent checks.

Bazile and Frederick are not the only Miami police officers under investigation. Nine others were relieved of duty in recent months and are under investigation in a corruption probe.

No related posts.

Category: Breach IncidentsGovernment SectorID TheftInsider

Post navigation

← New U.S. Supreme Court Decision Will Likely Impact Data Breach Litigation
Alabama Defendants Sentenced for Their Role in a Million Dollar Identity Theft Tax Scheme →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.