DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Miami-Dade County Resident Sentenced For Identity Theft Schemes Involving Fraudulent Social Security Benefits And Income Tax Refunds

Posted on September 30, 2014 by Dissent

Thervil Alcinor, 34, of Miami, was sentenced today before U.S. District Judge Cecilia M. Altonaga to 88 months in prison, followed by three years of supervised release.

Alcinor previously pled guilty to one count of access device fraud, in violation of Title 18, United States Code, Section 1029(a)(2), and one count of aggravated identity theft, in violation of Title 18, United States Code, Section 1028A.

According to court documents, from January 2013 through May 2014, Alcinor was involved in the use of personal identifying information (names, dates of birth, and social security numbers belonging to real people) to file fraudulent applications for Social Security Retirement Insurance Benefits (RIB) and Social Security Disability Insurance Benefits (DIB), and to file fraudulent income tax returns with the IRS claiming false refunds.

Court documents state that Alcinor was involved in establishing online accounts on the Social Security Administration website, MySSA.gov, for already-existing RIB or DIB beneficiaries to redirect RIB and DIB payments to accounts (often prepaid debit card accounts) controlled by him. Law enforcement identified 945 fraudulently established MySSA accounts, all with similarly concocted fraudulent email addresses. The fraudulent claims resulted in $700,462 in fraudulent RIB and DIB payments.

According to court documents, Alcinor was also involved in the filing of fraudulent tax returns claiming refunds from the IRS which he directed into accounts (often prepaid debit card accounts) controlled by him. Specifically from April 2012 through September 2013, 54 fraudulent income tax refunds, totaling $174,862.20, were identified by H&R Block records as having been deposited into accounts associated with Alcinor. An additional 14 fraudulent tax refunds, totaling $31,137.28, were connected to the scheme by IRS.

SOURCE: U.S. Attorney’s Office, Southern District of Florida

 


Related:

  • They were victims of a massive data breach in 2009. Interior Health denied it for a decade.
  • The Identity Theft Resource Center Remains Open to Victims Amid Government Shutdown
  • Kosovo National Pleads Guilty To Operating An Online Criminal Marketplace
  • Fake ID website busted; Dutch police deal a blow to criminal infrastructure
  • Two Defendants Plead Guilty To Fraud Scheme Involving Data Stolen From Hospital Patients
  • 39-year-old Nigerian extradited to US from France over alleged hacking
Category: ID Theft

Post navigation

← The Maricopa County Community Colleges District data breach investigation they didn’t want us to see
NZ: Hospital patient takes peek at info of others →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • ANNOUNCE: A new resource to help small and mid-sized HIPAA-regulated entities
  • Askul says 740,000 sets of data breached in cyberattack
  • Google and Apple roll out emergency security updates after zero-day attacks
  • Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data
  • Virginia Urology Silent on Possible Data Breach as Purported Patient Data Begins to Leak
  • Village of Golf Manor considering paying ransom amid cyberattack (1)
  • Teen who allegedly stole millions of personal data records arrested in Spain
  • Akira ransomware: FBI tallies 250 million in payouts
  • IE: HSE confirms second ransomware attack but ‘no evidence’ patient data was stolen
  • Examining impact of federal relief program after major healthcare cyberattack — Research Brief

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Slovenian officials weaponize data-privacy laws against investigative journalism
  • End-of-Year 2025 State and Federal Developments in Minors’ Privacy
  • Tool allows stealthy tracking of Signal and WhatsApp users through delivery receipts
  • Oh Great, Smart Glasses That Record Everything You Say
  • CBP Agents Held This U.S. Citizen for Hours Until He Agreed To Let Them Search His Electronic Devices

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.