DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update: Final Defendants Sentenced to Federal Prison for Participating in Identity Theft Scam

Posted on October 30, 2013 by Dissent

On September 30, there was an update from the IRS’s Criminal Investigation unit to an insider breach previously reported on this blog:

 The final two defendants charged in relation to an identity theft scam that used identities stolen from the Los Angeles County Department of Public Social Services to file fraudulent tax returns were sentenced today to federal prison.

Michael Williams, 43, of Palmdale, was sentenced to 33 months imprisonment; Mike Niko, 35, of Los Angeles, was sentenced to 15 months imprisonment. The defendants were further ordered by United States District Judge Dale S. Fischer to pay restitution to the government of $787,086 and $104,662, respectively.

The defendants previously sentenced in this case are:

  • Thomas Marshall, 38, of Lancaster, was sentenced in April to 57 months in prison and ordered to pay restitution in the amount of $1,245,637;
  • Mao Niko, 41, of Lynwood, was sentenced in April to 24 months in prison and ordered to pay restitution in the amount of $285,102;
  • Veronica Niko, 37, of Lancaster, was sentenced in July to 18 months in prison and ordered to pay restitution in the amount of $357,705.

According to documents filed with the court, from May 2008 through July 2010, co-defendant Thomas Marshall, along with co-conspirators Michael Williams, Veronica Niko, Mao Niko, and Mike Niko conspired to defraud the United States by using the personal identifying information of various individuals to file false tax returns claiming fraudulent tax refunds.

Veronica Niko stole names and social security numbers from the California Department of Public Social Services (DPSS) computer system. Marshall then gave the personal identifying information obtained from Veronica and others to co-conspirators to file fraudulent tax returns with the IRS. The fraudulent returns claimed the First Time Homebuyer Credit and/or Earned Income Credit, earning defendants as much as $8,000 per return, even though the individuals whose identities were used did not authorize or know about the filings.

Purporting to be tax preparers, Williams, Mao Niko and Mike Niko established bank accounts for the purpose of receiving the refunds claimed on the false tax returns. The refunds received were used for their own personal benefit and as compensation for Marshall and other co-conspirators.

All five defendants pleaded guilty to their various roles in the scheme. Defendants Marshall, Williams, Mao Niko, and Mike Niko pleaded guilty to conspiracy to submit false claims to the IRS. Defendant Veronica Niko pleaded guilty to one count of transfer/use of means of identification to commit an unlawful activity. In total, the United States Treasury paid more than $1.245 million in refunds to the defendants in response to fraudulent returns filed as part of the scheme.

This investigation was conducted by IRS Criminal Investigation special agents.


Related:

  • Revealed: Afghan data breach after MoD official left laptop open on train
  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • Alan Turing institute launches new mission to protect UK from cyber-attacks
Category: Government SectorID TheftInsiderU.S.

Post navigation

← App For Doctors Sends Unencrypted Data
Hosting Service MongoHQ Suffers Major Security Breach That Explains Buffer’s Hack Over The Weekend →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.