DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MO: Business Owner Pleads Guilty After Customers’ Information is Stolen in Bank Fraud Scheme

Posted on November 6, 2015 by Dissent

Tammy Dickinson, United States Attorney for the Western District of Missouri, announced yesterday that a former business owner in Sparta, Mo., pleaded guilty in federal court to his role in allowing his customers’ information to be stolen and used to promote a bank fraud scheme that used stolen mail and fake identifications to cash nearly $160,000 in fraudulent checks in Webster County, Mo., and elsewhere.

James Erin Guerin, also known as “Shorty,” 41, of Tulsa, Okla., formerly of Sparta, pleaded guilty before U.S. Magistrate Judge David P. Rush to being an accessory after the fact to aggravated identity theft.

Guerin was the owner of Rogersville Septic Services, LLC.

Co-defendant Phillip Daren Shockey, 50, of Crawford, Ark., was released from federal custody in Arkansas on July 31, 2013. Guerin paid Shockey’s $5,000 bond and Shockey was mandated to live with Guerin in Sparta. Shockey, who had been in federal custody in Arkansas for wire fraud, began to create fictitious financial documents using bank accounts and routing numbers of legitimate customers of Guerin’s plumbing business.

Shockey and those working at his direction passed and attempted to pass approximately 51 fraudulent checks for a loss of at least $159,842.

In August and September 2013, Guerin became aware that Shockey had taken the bank account and routing numbers from his plumbing business customers and was using them to produce fictitious financial documents such as bogus checks drawn upon the customers’ bank accounts. After learning of Shockey’s use of his customers’ bank accounts, Guerin continued to provide comfort and assistance to Shockey. Shockey was given sanctuary at Guerin’s residence to continue his illegal operation.

Shockey pleaded guilty on Jan. 14, 2015. Shockey admitted that he was the leader of the conspiracy to defraud more than a dozen banks from July 31, 2013, to Feb. 28, 2014, by passing counterfeited and forged checks with fake identification documents. At least 12 co-conspirators stole mail, printed counterfeit checks, passed counterfeit checks with fake identification and opened at least five fictitious businesses for the sole purpose of concealing the deposit and subsequent withdrawal of counterfeit checks.

Shockey recruited co-conspirators to steal mail and act as “check runners” who used false identity documents in order to cash fraudulent checks drawn upon the accounts of bank customers. Shockey possessed computers, printers, scanners, cell phones, thumb drives, stolen mail and software in order to produce fraudulent identification and checks for his co-conspirators. Shockey also used false identifications of the banks’ customers and others in order to pass and attempt to pass fraudulent checks.

Guerin is the final defendant to plead guilty in this case. Michael Anthony Spears, 36, of Fort Smith, Ark., was sentenced to seven years in federal prison without parole. Donald Allen Spears, 34, of Columbia, Mo., was sentenced to two years and three months in federal prison without parole. Laura Goines, 32, of Tulsa, was sentenced to time served. Amanda Brook Roberts, 30, of Tulsa, also has pleaded guilty and awaits sentencing.

Under federal statutes, Guerin is subject to a sentence of up to one year in federal prison without parole, plus a fine up to $100,000. A sentencing hearing will be scheduled after the completion of a presentence investigation by the United States Probation Office.

This case is being prosecuted by Assistant U.S. Attorney Abram McGull, II. It was investigated by the U.S. Secret Service Financial Crimes Task Force, the U.S. Postal Service – Criminal Investigations, the Springfield, Mo., Police Department, the Missouri State Highway Patrol, the Tulsa, Okla., Police Department, the Jasper County, Mo., Sheriff’s Office, the Webster County, Mo., Sheriff’s Office, the Greene County, Mo., Sheriff’s Office, the Columbia, Mo., Police Department, the Blue Springs, Mo., Police Department, the Monett, Mo., Police Department, the Pierce City, Mo., Police Department, the St. Clair County, Mo., Sheriff’s Department, the Rolla, Mo., Police Department and the Catoosa, Okla., Police Department.

SOURCE: U.S. Attorney’s Office, Western District of Missouri


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
Category: Business SectorID TheftInsiderU.S.

Post navigation

← UK: Probe after 1,000 tenants caught up in data security breach
Investigation continues into Cardinals’ hacking of Astros system →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.