DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FL Four Defendants Sentenced to Prison for Stolen Identity Tax Fraud Scheme

Posted on January 6, 2017 by Dissent

Four defendants have been sentenced to federal prison for their participation in a stolen identity tax fraud scheme.

Wolf Obin, 32, of Miami-Dade, was sentenced to 64 months in prison, to be followed by 3 years of supervised release. Stanley Moscova, 28, of Miami-Dade, was sentenced to 60 months in prison, to be followed by 3 years of supervised release. Rosny Muller, 29, of Broward County, was sentenced to 33 months in prison, to be followed by 3 years of supervised release. These three defendants were previously convicted at trial of one count of conspiracy to defraud the government with respect to claims, in violation of Title 18, United States Code, Section 286, and one count of possession of fifteen or more unauthorized access devices, in violation of Title 18, United States Code, Section 1029(a)(3). Obin and Moscova were also convicted of three counts of aggravated identity theft, in violation of Title 18, United States Code, Section 1028A.

According to evidence presented at trial, beginning in October 2011, Obin, Moscova, and Muller fraudulently obtained Electronic Filing Identification Numbers (EFINs) in the names of other individuals who acted as “straw” EFIN holders which allowed the defendants to submit tax returns in the names of other individuals. The defendants then used those EFINs, as well as EFINs in their own names, to file fraudulent federal income tax returns with the IRS using the stolen personal identifying information (PII) of other individuals without their knowledge and authority. During a search warrant of the defendants’ Aventura apartment, law enforcement discovered the PII of more than 1,600 individuals. Through their tax filings, the defendants claimed approximately $2,300,000 in fraudulent federal tax refunds from the IRS.

In a separate but related case, defendant Leonard Rosalvo Obin (Case Number 16CR20525), was sentenced to 30 months in prison, to be followed by 3 years of supervised release. Leonard Obin previously pled guilty to one count of possession of fifteen or more unauthorized access devices, and one count of aggravated identity theft. During the search warrant, law enforcement found a phone and flash drive in Leonard Obin’s pants pockets. The phone and flash drive contained the names, dates of birth, and Social Security numbers of 86 and 91 individuals, respectively.

 

Source: U.S. Attorney’s Office, Southern District of Florida


Related:

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Major trial underway for data leak that left 72,000 victims in France
  • WMATA Train Operators Arrested in Health Care Fraud Scheme
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
Category: ID Theft

Post navigation

← Founder of Fake Prison Charity sentenced for stealing Prisoner Identities, Claiming Millions of Dollars in false Tax Refunds
VA: Former Nurse Sentenced for ID Theft and Bank Fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app
  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report