DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

(follow-up) Springfield man pleads guilty to bank fraud, ID theft

Posted on January 9, 2010 by Dissent

Beth Phillips, United States Attorney for the Western District of Missouri, announced that Bryan Thomas Ray, 32, of Springfield, Missouri pleaded guilty in federal court to two federal indictments that charged him in an identity theft and check-counterfeiting conspiracy and with passing counterfeit $100 bills in Springfield. The bank fraud scheme involved false identification documents that were used to negotiate more than $100,000 in counterfeit checks. The counterfeiting scheme involved $13,300 in counterfeit $100 bills.

Ray admitted that, from April 13 to Nov. 29, 2008, he participated in a conspiracy in Greene and Jasper County, Mo., to steal checking account information and personal identity information from various victims. That information was used to produce counterfeit identification documents (such as driver’s licenses) and counterfeit personal, business and organizational checks that were cashed or used to make purchases. Some of the counterfeit checks were drawn on actual accounts, while others bore fictitious account information.

Ray used a counterfeit driver’s license with a false identity to attempt to cash a $1,175 fraudulent check at a Springfield Staples store on Sept. 27, 2008. The check was from a checkbook stolen from a residence in Ozark, Mo., in a home burglary nine days earlier. However, the clerk at the Staples store knew the identity theft victim and knew that Ray was an imposter. The clerk called the police and Ray fled from the store. When a detective from the Springfield Police Department apprehended him in the parking lot, Ray attempted to destroy the forged check by chewing and swallowing it. Police officers seized several items from Ray’s vehicle that are commonly used to create counterfeit identification documents.

When law enforcement officers attempted to make contact with individuals suspected to be involved in identity theft and bank fraud on Oct. 28, 2008, Ray fled from the residence on foot. He left parked in front of the residence a GMC Yukon SUV that had been provided to him by a co-defendant. Law enforcement officers seized 25 counterfeit Missouri driver’s licenses and non-driver’s identification cards bearing photographs of Ray from the GMC Yukon.

Ray, who also pleaded guilty to one count of aggravated identity theft, admitted that co-conspirators obtained $108,599 during the conspiracy.

In a separate and unrelated case, Ray also pleaded guilty to passing counterfeit $100 bills as charged in a second federal indictment. Ray admitted that he passed (or assisted co-defendant Jason Allen Hamann, 36, address unknown, to pass) $13,300 in counterfeit currency. He also admitted that he passed three counterfeit $100 bills at the Just for Him store in Springfield on Feb. 14, 2008.

Hamann was sentenced on July 16, 2009, to three years and 10 months in federal prison without parole after pleading guilty to manufacturing and passing counterfeit currency.

Co-defendant Kirsten Rena Kraichely, 28, of Springfield, also pleaded guilty on Thursday, Jan. 7, 2010, to possessing a counterfeit $100 bill. Kraichely admitted that she obtained the counterfeit currency from Hamann, whom she knew was manufacturing counterfeit currency.

Under federal statutes, Ray is subject to a sentence of up to 50 years in federal prison without parole, plus a mandatory term of two years in federal prison to be served consecutively to those counts, a fine up to $750,000 and an order of restitution. A sentencing hearing will be scheduled after the completion of a presentence investigation by the United States Probation Office.

These cases are being prosecuted by Assistant U.S. Attorneys Steven M. Mohlhenrich and Randall D. Eggert. They were investigated by the U.S. Secret Service, the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Green County, Mo., Sheriff’s Department and the police departments of Springfield, Joplin, Rogersville and Branson, Mo.

Source: U.S. Attorney’s Office


Related:

  • They were victims of a massive data breach in 2009. Interior Health denied it for a decade.
  • The Identity Theft Resource Center Remains Open to Victims Amid Government Shutdown
  • Kosovo National Pleads Guilty To Operating An Online Criminal Marketplace
  • Fake ID website busted; Dutch police deal a blow to criminal infrastructure
  • Two Defendants Plead Guilty To Fraud Scheme Involving Data Stolen From Hospital Patients
  • 39-year-old Nigerian extradited to US from France over alleged hacking
Category: ID Theft

Post navigation

← (follow-up) Belleville woman sentenced to four years for fraud
WA: Prolific ID thief sentenced to 4+ years in prison →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.