DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TX: Former VP of First Service CU convicted for bank fraud, ID theft

Posted on November 20, 2009 by Dissent

A former Senior Vice President of Area Operations for First Service Credit Union in Houston has pleaded guilty to embezzling more than $30,000 from his former employer, United States Attorney Tim Johnson announced today.

Christopher Allen, 41, of Houston, appeared before United States District Judge Sim Lake today and pleaded guilty to bank fraud and aggravated identity theft arising from a scheme he devised while employed as the Vice President of First Service Credit Union to steal more than $30,000 from the credit union’s customer accounts. First Service Credit Union is located in Houston.

As the Senior Vice President of Area Operations, Allen was responsible for managing and supervising credit union employees and the daily operations of the branches of the credit union. Allen used his position as a Senior Vice President to transfer money from one customer’s account into another customer’s account without their knowledge or consent. He would then withdraw the funds using ATM cards he also obtained without the customer’s consent from the second customer’s account. From Dec. 1, 2006, through Jan. 31, 2008, Allen conducted more than 200 ATM illegal account transfers and illegal ATM withdrawals defrauding the credit union of more than $30,000.

Allen’s fraud was discovered in 2008 when a first Service Credit Union customer reported suspicious activity in her account to the credit union. The United States Secret Service investigated the case.

Allen faces possible imprisonment of up to 30 years and a fine not to exceed $1,000,000 and five years supervised release for bank fraud. Allen faces an additional imprisonment of two years and a fine not to exceed $250,000 and one year supervised release for aggravated identity theft. Pursuant to the plea agreement, Allen agreed to pay restitution to First Service Credit Union. Sentencing is set for Feb. 12, 2010.

Allen has been permitted to remain on bond pending sentencing.

Source: USAO, Southern District of Texas


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Breach IncidentsFinancial SectorID TheftInsiderU.S.

Post navigation

← FL: Ten more indicted in Operation Felony Lane
Ca: Lost laptops shock watchdog →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.