DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

GA: Former IRS Revenue Agent Pleads Guilty to Aggravated Identity Theft of Taxpayer Information

Posted on May 13, 2016 by Dissent
Creshika Wise's LinkedIn picture. She's probably not smiling now.
Creshika Wise’s LinkedIn picture. She’s probably not smiling now.

Creshika C. Wise, a former Internal Revenue Service (IRS) Revenue Agent who impersonated a taxpayer in order to steal over $470,000, has pleaded guilty to a charge of aggravated identity theft.

According to U.S. Attorney John Horn, the charges and other information presented in court:  Creshika Wise worked for the IRS from 2008 until the spring of 2016, when she resigned after her arrest in this case.  While with the IRS, she served as a revenue agent.  In August 2013, Wise was assigned to audit the 2011 tax return of two married taxpayers who had significantly underpaid their 2011 federal income tax.  In September 2013, Wise and the taxpayers’ accountant met, and agreed that the taxpayers owed $758,846, plus interest, to the IRS.  Wise came up with a plan to steal most or all of that money.

The day after she met with the accountant, Wise placed in the IRS file for the audit a fictitious IRS Form 4549, “Income Tax Examination Changes” for the taxpayers.  This form is used by revenue agents to document changes to tax liability arrived at through the audits they conduct.  Wise falsified the form by dramatically understating the tax due to the IRS, reducing it from $758,846 to $282,363, and also by forging the accountant’s signature.

A few days later, Wise opened up a new checking account, in the name “Creshika C. Wise sole prop d/b/a U.S. Treasury and Accounting Service.”  In October, 2013, Wise emailed the taxpayer from her official IRS email account, and asked him to wire the funds the taxpayers owed the IRS to her newly opened bank account.  Wise’s email provided the routing and account number for the account, which she described as belonging to “U.S. Treasury and Accounting Services.”  Wise’s email did not disclose to the taxpayer that she personally, rather than the IRS, was actually the owner of the account.

The taxpayer never wired the funds as requested by Wise, as he had already mailed a check to the IRS for the full amount due.  Wise received the check, and processed it for credit to the taxpayers’ account.  However, Wise did not abandon her scheme.

Wise knew she had altered the IRS’s records to reflect a tax due of $282,363, rather than the agreed upon $758,846.  She also knew that when the IRS processed the check, the system would generate a refund check for any excess – here, over $470,000 – and mail it to the taxpayers’ address of record.  Wise turned her attention to getting the large check she knew would be coming to the taxpayers, and preparing to negotiate it herself.

  • On 10/21/2013, Wise opened a new UPS mailbox in her own name at a UPS Store location.  Soon afterward, Wise caused the taxpayers’ address to be changed in the IRS computer system from their correct address to that of Wise’s newly opened UPS mailbox, causing IRS correspondence to the taxpayers to be misdirected.
  • On 12/2/2013, impersonating the taxpayers, Wise filled out an online application for a new joint checking account in their names with a local bank.  On 12/10/13, Wise faxed the signature card, which she had created by forging the signatures of the taxpayers and using the husband’s social security number, to the bank.
  • On 12/20/2013, Wise called the bank to inquire whether the account was ready to be used.  This call was recorded and preserved by the bank.  In the call, Wise identified herself by name as one of the taxpayers, the wife, and provided the taxpayer’s correct social security number to confirm that identity.  Posing as the taxpayer, Wise said that it was important the account be opened quickly, because she was expecting a large check from the IRS.

Wise’s scheme to take most or all of the money owed by the taxpayers to the IRS was unsuccessful, in that neither the taxpayers nor the IRS suffered any monetary loss.

Sentencing for Creshika C. Wise, 31, of Fairburn, Georgia, is scheduled for August 3, 2016, at 2:00 p.m. before U.S. District Judge Amy Totenberg.

This case is being investigated by the Treasury Inspector General for Tax Administration.

Assistant United States Attorney Alana R. Black is prosecuting the case.

SOURCE: U.S. Attorney’s Office, Northern District of Georgia

Related posts:

  • The Secret IRS Files: Trove of Never-Before-Seen Records Reveal How the Wealthiest Avoid Income Tax
  • IRS’s Top 10 Identity Theft Prosecutions
  • IRS “Get Transcript” breach much bigger than first thought – now more than 700K victims
  • 25 Defendants Charged In Separate Schemes That Resulted In Thousands Of Identities Stolen And Millions Of Dollars In Identity Theft Tax Filings
Category: Government SectorID TheftInsiderU.S.

Post navigation

← Swift Warns of New Hacker Attack on Bank After Bangladesh Heist
Double whammy: Avention investigating two data breaches involving employee info →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The patient data appears fake. (2)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.