DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former Montgomery Nightclub Owner Sentenced to Prison for Role as Ringleader of Stolen Identity Tax Refund Fraud Scheme

Posted on April 17, 2015 by Dissent

Tarrish Tellis, 38, owned the Club Iconz Bar and Grill in Montgomery, Alabama. He was also the mastermind behind a stolen identity tax refund fraud scheme that stole over $700,000. Yesterday, Tellis was sentenced to 223 months in federal prison, three years of supervised release and ordered to pay $694,366 in restitution.

On Jan. 14, a federal jury convicted Tellis of conspiracy to commit theft of public money, theft of public money and aggravated identity theft.

According to evidence presented at trial, Tellis’ co-conspirator, Nakia Jackson, obtained approximately 700 names, dates of birth and social security numbers from an employee of the Alabama Medicaid State Agency.  Jackson provided some of the stolen names to Tellis, who in turn used them to file false income tax returns.  In exchange, Tellis taught Jackson how to file false tax returns.

Tellis concealed the origin of the tax refund proceeds by recruiting friends and relatives, including Bobby Joe Means, Delancey Tolliver, Glen Powell Jr. and Tracey Montgomery, to open up bank accounts for the purpose of receiving the tax refunds.  When the refunds were deposited into their bank accounts, Tellis directed them to withdraw the money and provide it to him.  On the false tax returns submitted to the Internal Revenue Service (IRS), Tellis directed more than $300,000 in refunds to be deposited in those accounts.  Tellis also recruited a bank teller at Community Bank and Trust , LaQuanta Clayton, who used her position to open up bank accounts in the name of fictitious individuals and in the name of her daughter’s father.  On the false tax returns submitted to the IRS, Tellis directed approximately $200,000 in refunds to be deposited into the accounts that Clayton controlled.

In 2014, Tellis’ co-conspirators were sentenced to prison for their involvement in the scheme: Jackson was sentenced to serve 87 months in prison, Clayton was sentenced to serve 21 months, Tolliver was sentenced to serve 15 months, Powell Jr. and Means were each sentenced to serve 12 months and one day, and Montgomery was sentenced to serve six months in prison.

SOURCE: U.S. Attorney’s Office, Middle District of Alabama

Related:

  • Revealed: Afghan data breach after MoD official left laptop open on train
  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • Alan Turing institute launches new mission to protect UK from cyber-attacks
Category: Government SectorID TheftInsiderU.S.

Post navigation

← Randall Charles Tucker accused of hacking Arizona Department of Child Safety
TheRealDeal Market: where hackers go to buy and sell zero-day exploits →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.