DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former U.S. Marine Charged with Stealing Identities of Fellow Service Personnel in Scheme to Defraud Navy Federal Credit Union of More Than $138,000

Posted on July 17, 2015 by Dissent

CHICAGO—A former United States Marine from Calumet City stole the identities of several fellow Marines and used their information to illegally procure more than $138,000 from Navy Federal Credit Union, according to an indictment returned this week in federal court in Chicago.

While serving in Combat Logistics Regiment 3 at Camp Foster in Okinawa, Japan, LEONARD E. PARKER JR. obtained a Marine roster containing the personal information of several fellow Marines stationed at the camp, according to the indictment. After returning to the United States, Parker and a co-defendant, DONTREAL S. EVANS, allegedly used the Marines’ information to transfer approximately $138,798 from the Marines’ accounts into bank accounts belonging to individuals Parker and Evans had recruited into the scheme.

Parker and Evans offered to pay those individuals to allow Parker and Evans to control and access the accounts, the indictment states. The pair later withdrew funds and made purchases from the accounts they controlled, and kept the proceeds from the scheme, according to the indictment. Parker also allegedly filed false tax returns in the names of Marines whose personal information was on the roster.

The indictment, which was returned Thursday, charged Parker, 24, of Calumet City, with five counts of financial institution fraud; one count of aggravated identity theft; and four counts of filing false claims against the United States. Evans, 21, of Lansing, was charged in the indictment with three counts of financial institution fraud. The defendants’ arraignment in U.S. District Court in Chicago has not yet been scheduled.

Each count of financial institution fraud carries a maximum sentence of 30 years in prison, a $1 million fine and mandatory restitution. If convicted of aggravated identity theft, Parker also would face a mandatory, consecutive term of two years in prison. Each count of filing false claims carries a maximum sentence of five years in prison, a $250,000 fine, and mandatory restitution. If convicted, the court must impose a reasonable sentence under federal sentencing statutes and the advisory United States Sentencing Guidelines.

The indictment was announced by Zachary T. Fardon, United States Attorney for the Northern District of Illinois; Robert J. Holley, Special Agent-in-Charge of the Chicago Office of the Federal Bureau of Investigation; and Stephen Boyd, Special Agent in Charge of the Internal Revenue Service Criminal Investigation in Chicago.

The investigation is ongoing.

The public is reminded that an indictment contains only charges and is not evidence of guilt. The defendants are presumed innocent and are entitled to a fair trial at which the government has the burden of proving guilt beyond a reasonable doubt.

The government is being represented by Special Assistant U.S. Attorney Heidi Manschreck.

SOURCE: US. Attorney’s Office, Northern District of Illinois

Category: Government SectorID TheftInsiderU.S.

Post navigation

← UCLA Health discloses network breach potentially affecting 4.5 million patients
Personal info of 700K is public record →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.