DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Alabama Man Pleads Guilty to Involvement in Identity Theft Scheme Using Prisoner Names and Corrupt U.S. Postal Service Employee

Posted on July 29, 2014 by Dissent

Gregory Slaton pleaded guilty today to one count of conspiracy to file false claims for his involvement in a Stolen Identity Tax Refund (SIRF) scheme, Deputy Assistant Attorney General Ronald A. Cimino of the Justice Department’s Tax Division and U.S. Attorney George L. Beck Jr. for the Middle District of Alabama announced.

According to the court documents and court proceedings, Gregory Slaton conspired with his wife, Jacqueline Slaton, of Montgomery, Alabama, his brother-in-law, Harvey James, of Birmingham, Alabama, and a U.S. Postal Service employee, Vernon Harrison, also of Montgomery, to file false tax returns using stolen identities. James and Jacqueline Slaton obtained stolen identities, including identities of inmates, and used those identities to file the false tax returns. They directed the fraudulently claimed tax refunds to prepaid debit cards and checks. Gregory Slaton recruited Harrison into the conspiracy, who then provided Gregory Slaton with mailing addresses on his postal route to which they could mail the fraudulently claimed prepaid debit cards. James and Jacqueline Slaton then directed the tax refunds issued via debit cards and checks to be sent to specified addresses on Harrison’s mail route. Gregory Slaton would then collect the cards and checks from Harrison and pay Harrison.

Harrison was previously convicted at trial for conspiracy to file false claims and multiple counts of mail fraud, theft of mail and aggravated identity theft, and was sentenced to serve 111 months in prison. James pleaded guilty to one count of mail fraud and one count of aggravated identity theft, and was sentenced to serve 110 months in prison. Jacqueline Slaton pleaded guilty to filing a false claim and aggravated identity theft, and was sentenced to serve 70 months in prison. A sentencing date has not been scheduled for Gregory Slaton.

The case was investigated by special agents of the Internal Revenue Service – Criminal Investigation, the Bureau of Alcohol, Tobacco, Firearms and Explosives and the U.S. Postal Service’s Office of the Inspector General. Trial Attorneys Jason Poole and Michael Boteler of the Tax Division are prosecuting the case with the assistance of Assistant U.S. Attorney Todd Brown of the U.S. Attorney’s Office for the Middle District of Alabama.

Additional information about the Tax Division and its enforcement efforts may be found at the division website .

SOURCE: Department of Justice

Note: much of the stolen identity information came from inmates of the Alabama Department of Corrections. In a related prosecution, it was noted that a medical records clerk at one Alabama DOC facility was selling inmates’ information to Jacqueline Slaton.

No related posts.

Category: Government SectorID Theft

Post navigation

← Employee of Cancer Specialists of Tidewater stole more than 2,000 patients' identity information
Woman sentenced in federal identity theft case stole more than 700 identities →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.