DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former U.S. Marine Charged with Stealing Identities of Fellow Service Personnel in Scheme to Defraud Navy Federal Credit Union of More Than $138,000

Posted on July 17, 2015 by Dissent

CHICAGO—A former United States Marine from Calumet City stole the identities of several fellow Marines and used their information to illegally procure more than $138,000 from Navy Federal Credit Union, according to an indictment returned this week in federal court in Chicago.

While serving in Combat Logistics Regiment 3 at Camp Foster in Okinawa, Japan, LEONARD E. PARKER JR. obtained a Marine roster containing the personal information of several fellow Marines stationed at the camp, according to the indictment. After returning to the United States, Parker and a co-defendant, DONTREAL S. EVANS, allegedly used the Marines’ information to transfer approximately $138,798 from the Marines’ accounts into bank accounts belonging to individuals Parker and Evans had recruited into the scheme.

Parker and Evans offered to pay those individuals to allow Parker and Evans to control and access the accounts, the indictment states. The pair later withdrew funds and made purchases from the accounts they controlled, and kept the proceeds from the scheme, according to the indictment. Parker also allegedly filed false tax returns in the names of Marines whose personal information was on the roster.

The indictment, which was returned Thursday, charged Parker, 24, of Calumet City, with five counts of financial institution fraud; one count of aggravated identity theft; and four counts of filing false claims against the United States. Evans, 21, of Lansing, was charged in the indictment with three counts of financial institution fraud. The defendants’ arraignment in U.S. District Court in Chicago has not yet been scheduled.

Each count of financial institution fraud carries a maximum sentence of 30 years in prison, a $1 million fine and mandatory restitution. If convicted of aggravated identity theft, Parker also would face a mandatory, consecutive term of two years in prison. Each count of filing false claims carries a maximum sentence of five years in prison, a $250,000 fine, and mandatory restitution. If convicted, the court must impose a reasonable sentence under federal sentencing statutes and the advisory United States Sentencing Guidelines.

The indictment was announced by Zachary T. Fardon, United States Attorney for the Northern District of Illinois; Robert J. Holley, Special Agent-in-Charge of the Chicago Office of the Federal Bureau of Investigation; and Stephen Boyd, Special Agent in Charge of the Internal Revenue Service Criminal Investigation in Chicago.

The investigation is ongoing.

The public is reminded that an indictment contains only charges and is not evidence of guilt. The defendants are presumed innocent and are entitled to a fair trial at which the government has the burden of proving guilt beyond a reasonable doubt.

The government is being represented by Special Assistant U.S. Attorney Heidi Manschreck.

SOURCE: US. Attorney’s Office, Northern District of Illinois


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Kaufman County's data breach was their second one in three weeks
Category: Government SectorID TheftInsiderU.S.

Post navigation

← UCLA Health discloses network breach potentially affecting 4.5 million patients
Personal info of 700K is public record →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.