DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WI: Former Forest Service Employee Sentenced in Federal Court for Identity Theft and Credit Card Fraud

Posted on December 21, 2016 by Dissent

United States Attorney Gregory A. Haanstad of the Eastern District of Wisconsin announced Tuesday that Michael Hanan, 35, of Sussex, Wisconsin was sentenced to 4 years’ imprisonment and  3 years supervised release for identity theft and credit card fraud. In September of 2016, Hanan pleaded guilty to one count of access-device fraud, in violation of 18 United States Code, Section 1029(a)(5), and one count of aggravated identity theft, in violation of 18 United States Code, Section 1028A.

Until earlier this year, Hanan worked as a Human Resources Labor Relations Specialist for the Forest Service, part of the U.S. Department of Agriculture.  In that position, he had access to current and former Forest Service employees’ personal identifying information.  Beginning in approximately February of 2016, Hanan began using the personal information of current and former Forest Service employees to open retail credit cards in the names of those employees and their family members.  He also used the personal information of his own family members to do the same. Hanan opened dozens of credit cards affiliated with Meijer and K-Mart / Sears stores, and used those cards to purchase items such as pre-paid gift cards, personal-grooming products, and food items. Hanan did not pay those credit card balances, and caused over $90,000 in actual losses.

Hanan was initially arrested on charges of identity theft and credit-card fraud on May 5, 2016.  While awaiting trial, he was released on conditions imposed by the U.S. District Court for the Eastern District of Wisconsin.  Hanan continued to commit identity theft and fraud while on pre-trial release and repeatedly violated the conditions of his release.

In October of 2016, Hanan’s brother, Daniel W. Hanan, pleaded guilty to conspiring with Michael Hanan to corruptly obstruct Michael Hanan’s criminal proceedings, in violation of 18 United States Code, Section 1512. Daniel W. Hanan is currently awaiting sentencing.

This case was investigated by the Office of the Inspector General for the U.S. Department of Agriculture, the Greenfield Police Department, the U.S. Postal Service, and the Waukesha County Sheriff’s Department. The case was prosecuted by Assistant United States Attorneys Rebecca Taibleson and Carol Kraft.

Information from U.S.A.O., Eastern District of Wisconsin


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • Alan Turing institute launches new mission to protect UK from cyber-attacks
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
Category: Government SectorID TheftInsiderU.S.

Post navigation

← Regina-area physician guilty of unprofessional conduct for record snooping
GA: Columbia County schools victim of data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.