DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

GA: Former IRS Revenue Agent Pleads Guilty to Aggravated Identity Theft of Taxpayer Information

Posted on May 13, 2016 by Dissent
Creshika Wise's LinkedIn picture. She's probably not smiling now.
Creshika Wise’s LinkedIn picture. She’s probably not smiling now.

Creshika C. Wise, a former Internal Revenue Service (IRS) Revenue Agent who impersonated a taxpayer in order to steal over $470,000, has pleaded guilty to a charge of aggravated identity theft.

According to U.S. Attorney John Horn, the charges and other information presented in court:  Creshika Wise worked for the IRS from 2008 until the spring of 2016, when she resigned after her arrest in this case.  While with the IRS, she served as a revenue agent.  In August 2013, Wise was assigned to audit the 2011 tax return of two married taxpayers who had significantly underpaid their 2011 federal income tax.  In September 2013, Wise and the taxpayers’ accountant met, and agreed that the taxpayers owed $758,846, plus interest, to the IRS.  Wise came up with a plan to steal most or all of that money.

The day after she met with the accountant, Wise placed in the IRS file for the audit a fictitious IRS Form 4549, “Income Tax Examination Changes” for the taxpayers.  This form is used by revenue agents to document changes to tax liability arrived at through the audits they conduct.  Wise falsified the form by dramatically understating the tax due to the IRS, reducing it from $758,846 to $282,363, and also by forging the accountant’s signature.

A few days later, Wise opened up a new checking account, in the name “Creshika C. Wise sole prop d/b/a U.S. Treasury and Accounting Service.”  In October, 2013, Wise emailed the taxpayer from her official IRS email account, and asked him to wire the funds the taxpayers owed the IRS to her newly opened bank account.  Wise’s email provided the routing and account number for the account, which she described as belonging to “U.S. Treasury and Accounting Services.”  Wise’s email did not disclose to the taxpayer that she personally, rather than the IRS, was actually the owner of the account.

The taxpayer never wired the funds as requested by Wise, as he had already mailed a check to the IRS for the full amount due.  Wise received the check, and processed it for credit to the taxpayers’ account.  However, Wise did not abandon her scheme.

Wise knew she had altered the IRS’s records to reflect a tax due of $282,363, rather than the agreed upon $758,846.  She also knew that when the IRS processed the check, the system would generate a refund check for any excess – here, over $470,000 – and mail it to the taxpayers’ address of record.  Wise turned her attention to getting the large check she knew would be coming to the taxpayers, and preparing to negotiate it herself.

  • On 10/21/2013, Wise opened a new UPS mailbox in her own name at a UPS Store location.  Soon afterward, Wise caused the taxpayers’ address to be changed in the IRS computer system from their correct address to that of Wise’s newly opened UPS mailbox, causing IRS correspondence to the taxpayers to be misdirected.
  • On 12/2/2013, impersonating the taxpayers, Wise filled out an online application for a new joint checking account in their names with a local bank.  On 12/10/13, Wise faxed the signature card, which she had created by forging the signatures of the taxpayers and using the husband’s social security number, to the bank.
  • On 12/20/2013, Wise called the bank to inquire whether the account was ready to be used.  This call was recorded and preserved by the bank.  In the call, Wise identified herself by name as one of the taxpayers, the wife, and provided the taxpayer’s correct social security number to confirm that identity.  Posing as the taxpayer, Wise said that it was important the account be opened quickly, because she was expecting a large check from the IRS.

Wise’s scheme to take most or all of the money owed by the taxpayers to the IRS was unsuccessful, in that neither the taxpayers nor the IRS suffered any monetary loss.

Sentencing for Creshika C. Wise, 31, of Fairburn, Georgia, is scheduled for August 3, 2016, at 2:00 p.m. before U.S. District Judge Amy Totenberg.

This case is being investigated by the Treasury Inspector General for Tax Administration.

Assistant United States Attorney Alana R. Black is prosecuting the case.

SOURCE: U.S. Attorney’s Office, Northern District of Georgia

Category: Government SectorID TheftInsiderU.S.

Post navigation

← Swift Warns of New Hacker Attack on Bank After Bangladesh Heist
Double whammy: Avention investigating two data breaches involving employee info →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.