Enable scripting to view the full contents of the page
Skip navigation.
TIGTA Print Friendly

Printed on  

Are you a victim of an IRS-Related Coronavirus Scam? »

Slam the Scam icon Latest IRS Impersonation Scam Update: TIGTA Unveils New Flyer Warning Taxpayers About Impersonation Scam... learn more.
Prior scam alerts
► If you believe you have been a victim of an IRS Impersonation Scam, contact us.
► View this Public Service Announcement video.
► Downloadable IRS Scam Files: Warning Flyer, 5X8 Poster, 11X17 Poster & Slam the Scam Flyer.
► TIGTA partners with the Department of Justice's Elder Justice Initiative, view webinar.
► If you lost money to IRS scammers via Western Union, you may be able to file a claim to recover funds.
Visit the Federal Trade Commission's website to learn more and get started.

Main

History

Office Locations

Investigatory Interview Procedures

Performance Model

Retired Law Enforcement Officer Photographic Identification

*
Highlights

TIGTA Related
Department of Justice
Press Releases

Procurement Fraud Brochure [PDF]

 
Highlights

Archives: 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 | 2005 | 2004


The Investigation Highlights are updated weekly.

Documents noted as PDF require a special plugin. To obtain the free reader for this format, please visit the Adobe web site.

September 30, 2020

Former CPA Sentenced for Making A False Statement to the IRS [1]

On July 8, 2020, in the Western District of Kentucky, Pamela Keyes was sentenced for making a false statement to the Internal Revenue Service (IRS). Keyes pled guilty to the offense in December 2019.

According to the court documents, from approximately October 16, 2014 through June 25, 2015, Keyes made representations to the IRS that she was a Certified Public Accountant when she knew that she was not. She made these statements while employed at an accounting firm in the Louisville, Kentucky, area. Her actions resulted in monetary ramifications for her clients, some of whom obtained civil judgments against Keyes.

Keyes was sentenced to five years’ probation, ordered to pay $97,696.91 in restitution, and ordered to pay a $100 special assessment fee.

  • [1] The facts in this case narrative come from the following publicly available documents: W.D. Ky. Crim. Info., filed Oct. 8, 2019; W.D. Ky. Plea Agr., filed Dec. 4, 2019; Pros. Sent. Memo., filed Mar. 10, 2020; W.D. Ky. Judgment & Commit. Order, filed Jul. 13, 2020.


  • Nevada Woman Pleads Guilty for Role in India-based IRS Impersonation Scam [1]

    On July 21, 2020, in the District of Nevada, Ladda Boonlert pled guilty to conspiracy to commit wire fraud and aggravated identity theft for her role in a scheme involving the impersonation of Internal Revenue Service (IRS) employees. Boonlert was initially charged in a 22-count indictment filed on December 10, 2019.

    According to the court documents, from January 2015 through September 2017, Boonlert conspired with individuals located in India and the United States to obtain money from victims under false or fraudulent pretenses. The scheme involved coconspirators, primarily in India, pretending to be IRS employees. The coconspirators falsely told the victims they owed outstanding taxes and threatened victims with arrest if they did not make immediate payments. Because of the scheme, over 2,700 victims made more than $2.4 million in payments to the coconspirators.

    Boonlert acted as a runner for the scheme, picking up victims’ payments from MoneyGram®, Target™, and other businesses, knowing that these proceeds were the product of a fraudulent scheme. She admitted to being a leader in the conspiracy: she recruited at least 10 additional runners and directed others to recruit more.

    Boonlert faces up to 20 years’ imprisonment for the wire fraud conspiracy and a mandatory minimum sentence of two years’ imprisonment, which must run consecutive to any other sentence of imprisonment, for the aggravated identity theft offense. In addition, she faces a maximum fine of $250,000, or twice the gross gain or gross loss, whichever is greatest; a period of supervised release of up to three years following imprisonment; special assessments of $200.00; and payment of $2,455,547.06 in restitution to the victims. Sentencing in this matter is scheduled for October 27, 2020.

    • [1] The facts in this case narrative come from the following publicly available documents: D. Nev., Dock. Rep., run Jul. 24, 2020; D. Nev., Plea Agr., filed Jul. 21, 2020; and D. Nev., Indict. Filed Dec. 10, 2019.


    • California Man Pleads Guilty to Depositing Stolen Treasury Checks [1]

      On June 29, 2020, in the Central District of California, Angelo Phoenix pled guilty to bank fraud for his role in a scheme involving stolen United States Treasury checks. Phoenix was initially charged in a nine-count indictment issued on December 6, 2019.

      According to the court documents, during an unknown period ending in November 2019, Phoenix executed a scheme to defraud several banks. First, Phoenix obtained stolen Internal Revenue Service (IRS) tax refund checks issued to at least 36 victims. He then opened bank accounts in the names of some of the victims, without their knowledge or permission, and deposited the stolen checks. Phoenix also altered some of the stolen checks so they appeared to list himself as a payee and then deposited those checks into bank accounts in his own name. The overall scheme had an intended loss (that is, the amount of pecuniary harm Phoenix intended to inflict) of more than $150,000.

      At sentencing, Phoenix faces up to 30 years’ imprisonment; a five-year period of supervised release; a fine of $1,000,000, or twice the gross gain or loss, whichever is greater; restitution to the victims; and a mandatory special assessment of $100. Sentencing is scheduled for October 9, 2020.

      • [1] The facts in this case narrative come from the following publicly available documents: C.D. Cal., Indict., filed Dec. 06, 2019; C.D. Cal., Plea Agr., filed May 20, 2020; and C.D. Cal., Dock. Rep., run Aug. 03, 2020.


      • Tax Preparation Business Owner Pleads Guilty for Conspiring to Defraud the IRS [1]

        On July 30, 2020, in the Eastern District of New York, Richard Barker, owner of a tax preparation business operating under the names Tax Depot, Inc. (Tax Depot) and Kampant, Parkinson, Sinclair & Co., Inc. (KPS), pled guilty to conspiracy to defraud the United States for his role in an Internal Revenue Service (IRS) fraudulent document scheme. Barker was initially charged in a six-count indictment issued on January 30, 2020.

        According to the court documents, between approximately May 2011 and August 2017, Barker and his coconspirators executed a scheme to defraud the IRS by filing false Federal income tax returns through Tax Depot and KPS. The scheme involved the use of claims and fictitious forms, to include IRS Form 1099-OID, Original Issue Discount. The IRS Forms 1099-OID falsely reported that various entities had withheld Federal income tax of more than $348,000 on behalf of Barker, his coconspirators, and others. Based on the fictitious withholdings, Barker and his coconspirators prepared and filed false Federal income tax returns, for themselves and others, claiming more than $581,000 in Federal tax refunds that they were not entitled to receive. Despite the IRS sending Barker and his coconspirators notices advising that information filed was not valid and deemed to be frivolous, they continued to submit false documentation to the IRS. At sentencing, Barker faces up to five years’ imprisonment. Sentencing is scheduled for January 7, 2021.

        • [1] The facts in this case narrative come from the following publicly available documents: E.D.N.Y., Indict., filed Jan. 30, 2020, and E.D.N.Y., Dock. Rep., run Aug. 06, 2020.


        • Georgia Man Indicted for Bomb Threat against IRS Office in New York [1]

          On August 5, 2020, in the Southern District of Georgia, Benjamin Stasko was indicted for making a willful threat to kill using an explosive and the interstate transmission of a threat to injure. These charges stemmed from a July 2020 threat Stasko made to bomb an Internal Revenue Service (IRS) office located in New York, New York.

          According to the court documents, on July 6, 2020, Stasko posted on a public website a bomb threat. The post claimed that a “highly explosive pipe bomb,” intended for the IRS, was placed inside the Federal building located at 290 Broadway, New York, New York. Law enforcement officers and bomb-sniffing canines responded to the Federal building, but did not locate an explosive device. Subsequent investigative efforts by TIGTA special agents identified Stasko as the person responsible for posting the threat. These efforts also revealed that Stasko had items at his residence believed to be the beginnings of a pipe bomb, along with notes explaining how he would blow up the IRS building.

          If convicted of the indicted offenses, Stasko faces fines for each offense and up to 10 years’ imprisonment.

          • [1] The facts in this case narrative come from the following publicly available documents: S.D. Ga., Crim. Comp., filed Jul. 13, 2020, and S.D. Ga., Indict., filed Aug. 5, 2020.


          • August 31, 2020

            Illinois Man Charged with Coronavirus Relief Loan Scheme [1]

            On June 15, 2020, in the Northern District of Illinois, Rahul Shah was charged with bank fraud and false statements to a financial institution in connection with the Coronavirus Aid, Relief, and Economic Security (CARES) Act.

            According to the court documents, Shah owned N2N Holdings, a company operating under the name Boardshare in Evanston, Illinois. On or about April 30, 2020, a financial institution in Pittsburgh, Pennsylvania, received a loan application seeking $441,138 under the Paycheck Protection Program (PPP). The PPP is authorized under the CARES Act to provide forgivable loans to small businesses for job retention and certain other expenses. The loan application for N2N Holdings included falsified Internal Revenue Service (IRS) documents purporting to show employee and payroll amounts. Shah reported that his business had 10 employees and an average monthly payroll of $176,455.

            A review of the IRS records determined that the IRS forms and documents Shah submitted regarding N2N Holdings contained false information, and the average payroll for N2N Holdings was lower than Shah claimed. Alleged employees of N2N Holdings were interviewed and they denied working for, or receiving compensation from N2N Holdings. In addition, during an interview with TIGTA and FBI agents, Shah admitted knowing that there were “errors” in the documentation submitted for the N2N Holdings loan application. He also admitted to preparing false IRS documents in support of the loan application.

            If convicted, Shah could face a fine of over $1 million dollars, and more than 30 years’ imprisonment.

            • [1] The facts in this case narrative come from the following publicly available document: N.D.Ill., Crim. Comp., filed Jun. 15, 2020.


            • New York Freelance Information Broker Pleads Guilty for Impersonating Taxpayers to Illegally Obtain Federal Tax Information from the IRS [1]

              On June 29, 2020, in the Northern District of New York, Stephen Mockler pled guilty to wire fraud, conspiracy to commit wire fraud, aggravated identity theft, and misuse of Social Security Numbers (SSN), in connection with a for-profit scheme he devised to illegally obtain confidential tax information from the Internal Revenue Service (IRS).

              According to the court documents, from approximately August 2017 through January 2018, Mockler worked as a freelance information broker from his residences in New York. In this capacity, private investigative agencies paid Mockler to obtain confidential Federal tax information, including Federal Employer Identification Numbers and wage histories.

              As part of the scheme, Mockler called the IRS more than 1,500 times, impersonating various taxpayers using personal identifying information provided to him by the private investigative firms and fraudulently causing the IRS to release confidential Federal tax information to him. Mockler then provided the fraudulently obtained confidential Federal tax information to the private investigative agencies, who passed it on to their clients.

              When Mockler engaged in the foregoing activities, he knew that the taxpayers whose SSNs and other personal identifying information he used had not authorized the release of their confidential Federal tax information, or the confidential Federal tax information of their businesses, to him. Mockler also knew that the taxpayers did not authorize him to impersonate them or to use their SSNs.

              Mockler faces a maximum fine of $250,000 per count. In addition, he faces a maximum of 20 years’ imprisonment, per count, for his wire fraud and related offenses; a mandatory minimum sentence of two years’ imprisonment, per count, for his aggravated identity theft offenses; and a maximum of five years’ imprisonment, per count, for his misuse of SSN offenses. Mockler also may be required to serve a period of supervised release of up to three years following imprisonment.

              • [1] The facts in this case narrative come from the following publicly available documents: N.D.N.Y., Plea Agr., filed Jun. 29, 2020 and N.D.N.Y., Crim. Info., filed Jun. 29, 2020.


              • IRS Employee Pleads Guilty to Filing False Tax Returns [1]

                On June 30, 2020, in the District of Massachusetts, Internal Revenue Service (IRS) Lead Contact Representative Jennifer True pled guilty to multiple counts of aiding and assisting in the filing of a false tax return and filing of a fraudulent tax return by an employee of the United States. True was initially charged with wire fraud and aggravated identity theft on January 13, 2020.

                According to the court documents, from approximately February 2012 through April 2017, True electronically filed more than 590 Federal tax returns, most of which she prepared for other individuals, often in exchange for money. She charged between $40 and $100 for preparing tax returns, knowing that she was in violation of rules prohibiting such activity by IRS employees. In addition, True prepared at least 70 IRS Forms 1040, U.S. Individual Income Tax Return, that included materially false items, such as false Individual Retirement Account deductions, false itemized deductions, and false dependent and childcare expenses, that allowed True and others to receive refunds to which they were not entitled. Witnesses interviewed during the course of the investigation advised that they had not provided True with the false information on their returns and that they did not know that True was including such false information on the returns she prepared for them.

                At sentencing, True faces up to three years’ imprisonment for each count of aiding and assisting in the filing of false tax returns and up to five years’ imprisonment for each count of filing a fraudulent tax return as an employee of the United States. True also faces supervised release of up to three years; a fine of $250,000, or twice the gross gain or loss, whichever is greater; a mandatory special assessment; and discharge from employment. Furthermore, True owes restitution to the IRS of at least $640,918.98.

                • [1] The facts in this case narrative come from the following publicly available documents: D. Mass. Crim. Comp., filed Jan.13, 2020; D. Mass. Plea Agr., filed Jul. 1, 2020; and D. Mass. Info., filed Jul. 1, 2020.


                • Man Sentenced in Connection with IRS Telephone Scam [1]

                  On July 9, 2020, in the Northern District of Georgia, Joish Patel was sentenced for his role in a wire fraud conspiracy to defraud U. S. residents. Patel previously pled guilty to the offense in March 2020.

                  According to the court documents, Patel was identified as a runner in a telephone fraud scheme designed to target U.S. residents by misleading them into sending money in connection with a number of different confidence scams. In one of the scams, Patel and his coconspirators impersonated Internal Revenue Service (IRS) officers to defraud victims by misleading them into believing they owed money to the IRS and that they would be arrested if they did not pay immediately. As part of the scheme, Patel received more than $150,000 from at least 160 victims from August to November 2017. Patel used approximately 15 aliases to pick up wire transfers, in multiple States, from victims of the scams.

                  Patel was sentenced to 25 months in prison and three years of supervised release. He was also ordered to pay $144,516.74 in restitution to his victims and a $100 special assessment fee.

                  • [1] The facts in this case narrative come from the following publicly available documents: N.D. Ga. Crim. Compl., filed Feb. 4, 2019; N.D. Ga. Indict., filed Mar. 5, 2019; and, N.D. Ga. Judgement, filed Jul. 13, 2020.


                  • July 28, 2020

                    Man Charged with $5 Million Coronavirus Relief Loan Scheme [1]

                    On May 19, 2020, in the Eastern District of Texas, Samuel Yates was charged with wire fraud, bank fraud, false statements to a financial institution, and false statements to the Small Business Administration in connection with the Coronavirus Aid, Relief, and Economic Security (CARES) Act.

                    According to the court documents, Yates allegedly obtained an Employer Identification Number from the Internal Revenue Service (IRS) in March 2020 in order to document a business to use in fraudulent CARES Act-related loan applications. Yates subsequently made two fraudulent applications to two different lenders. He provided the lenders with IRS forms that were falsified or that included false statements, to make him appear eligible for CARES Act-related funds.

                    In the application submitted to the first lender, Yates sought more than $5.2 million in loan proceeds, by fraudulently claiming to have 412 employees with an average monthly payroll in excess of $2 million. In the second application, Yates claimed to employ more than 100 individuals and was able to obtain a loan of approximately $533,216.

                    With each application, Yates submitted a list of names of purported employees that he obtained from a publicly available random name generator. He also included false IRS payroll tax documents in the business name he established in March 2020. These documents contained substantially different numbers for each loan application, despite purporting to be for the same business.

                    If convicted, Yates could face a fine of up to $1 million and/or 30 years’ imprisonment or more.

                    • [1] The facts in this case narrative come from the following publicly available documents: DOJ Press Rel., issued May 19, 2020 and E.D.Tex. Crim. Comp., filed May 18, 2020.


                    • Software Engineer Charged with $1.5 Million Coronavirus Relief Loan Scheme [1]

                      On May 22, 2020, in the Western District of Washington, Baoke Zhang was arrested and charged with wire fraud and bank fraud in connection with the Coronavirus Aid, Relief, and Economic Security (CARES) Act.

                      According to the court documents, Zhang submitted three different loan applications to two different lenders, seeking more than $1.5 million under the Paycheck Protection Program (PPP). The PPP was authorized under the CARES Act to provide forgivable loans to small businesses for job retention and certain other expenses. Zhang submitted the loan applications, which included multiple false documents and statements, in the names of fictitious entities. In order to accomplish the fraud, Zhang obtained Employer Identification Numbers (EIN) from the Internal Revenue Service (IRS) in April 2020 to document two fictitious entities. He then submitted fraudulent CARES Act-related loan applications in the names of these entities.

                      The loan applications contained statements that the entities had been assigned EINs years prior to the actual assignment dates for the EINs and included altered copies of IRS notices reflecting these earlier assignment dates. The applications also included falsified IRS documentation purporting to show employee and payroll amounts.

                      If convicted, Zhang could face a fine up to $1 million and/or up to 30 years’ imprisonment.

                      • [1] The facts in this case narrative come from the following publicly available documents: W.D.Wash., Crim. Comp., filed May 21, 2020, and DOJ Press Rel., issued May 22, 2020.


                      • Florida Man Pleads Guilty to Conspiracy to Launder Proceeds of IRS Impersonation Scam [1]

                        On May 28, 2020, in the Southern District of Florida, Teo Rosengarten pled guilty for his role in a conspiracy involving the impersonation of employees from various government agencies. Rosengarten was initially charged in February 2020.

                        According to the court documents, from about March 2017 through in or around July 2017, Rosengarten conspired with others, including co-defendant Scott Levenberg, to launder money in connection with a wire fraud scheme. Per the factual agreement accompanying co-defendant Levenberg’s guilty plea, the scheme involved various individuals who called victims and pretended to be government officials, most often Internal Revenue Service (IRS) agents. The callers claimed the victims owed back taxes with compound interest and fees. The callers threatened victims with arrest if they did not make immediate payments into bank accounts controlled by Rosengarten.

                        As part of the conspiracy, Rosengarten provided his bank account information to receive funds from victims of the scheme, in exchange for a percentage of the deposited money. In addition, Rosengarten recruited others to open multiple bank accounts, in order to receive money that he knew was derived from criminal activity.

                        Rosengarten faces a statutory maximum term of imprisonment of up to 20 years, followed by a term of supervised release of up to three years, and a court imposed fine of up to $500,000, or double the gross proceeds from the scheme.

                        • [1] The facts in this case narrative come from the following publicly available documents: S.D. Fla. Plea Agr., filed Apr. 16, 2020, S.D. Fla. Super. Infor., filed Feb. 28, 2020, and S.D. Fla. Factual Agr., filed May 28, 2020.


                        • Oregon Woman Charged with Bank Fraud While Awaiting Trial for Impersonating an Internal Revenue Service Employee, Among Other Offenses [1]

                          On May 21, 2020, in the District of Oregon, Anndrea Jacobs, while awaiting trial for other Federal offenses, was charged with bank fraud related to checks Jacobs stole while she was employed at a dental practice in Hood River, Oregon. In September 2018, Jacobs was indicted for numerous Federal offenses, including the impersonation of an Internal Revenue Service (IRS) employee.

                          According to the court documents, Jacobs was involved in a scheme to defraud a former employer by embezzling approximately $1 million between January 2011 and December 2015. In order to conceal her embezzlement activity, Jacobs created false entries in the business books and records that overstated the business’s expenses and estimated tax payments. Then Jacobs convinced her former employer to grant her limited Power of Attorney to handle the employer’s collection action with the IRS. Jacobs changed her employer’s contact information with the IRS to her own and diverted all IRS correspondence and communications to herself. Jacobs then created a fictitious identity as an IRS Taxpayer Advocate, established a phone number and a voicemail account for the fictitious identity, provided her employer with a fictitious IRS tax case number, and purported to assist her employer with the IRS tax collection issues while impersonating an IRS employee.

                          While on pre-trial release for the aforementioned offenses, from approximately August 2019 through October 2019, Jacobs stole checks from the dental practice in Hood River, Oregon valued at more than $22,000.00.

                          Jacobs faces more than 30 years’ imprisonment if convicted of all offenses.

                          • [1] The facts in this case narrative come from the following publicly available documents: D. of Ore. Crim. Comp., filed May 21, 2020 and D. of Ore. Indict., Sept. 12, 2018.


                          • Man Charged with Filing False Liens against Treasury Officials [1]

                            On June 10, 2020, in the Northern District of Georgia, Hakim Archible was indicted for filing false liens against a former Internal Revenue Service (IRS) Commissioner and a former Secretary of the Treasury and for corruptly obstructing and impeding, and corruptly endeavoring to obstruct and impede, the due administration of Internal Revenue laws.

                            According to the court documents, in November 2014, Archible filed liens and encumbrances in the Fayette County, Georgia, clerk’s office, when he knew these documents contained materially false statements and representations. One of the false liens was filed in the name John Koskinen, a former IRS Commissioner, which claimed Commissioner Koskinen was the debtor and responsible for a $5,000.00 Federal tax penalty issued to Archible for the 2013 tax year. In December 2014 and December 2015, Archible filed additional false liens against Jacob Lew, a former Secretary of the Treasury, which claimed Secretary Lew was the debtor and responsible party for, among other things, a “chargeback order” in the amount of $100 billion and a “registered bona fide security” in the amount of $10 billion. Archible mailed copies of these false documents to Commissioner Koskinen at the IRS.

                            Archible faces more than 10 years’ imprisonment if convicted of all offenses.

                            • [1] The facts in this case narrative come from the following publicly available document: N.D.Ga. Super. Indict., filed Jun. 10, 2020.


                            • June 24, 2020

                              Man Sentenced for His Role in Treasury Check Thefts [1]

                              On January 17, 2020, in the Southern District of New York, Lenin Guzman-Hidalgo was sentenced for his role in the theft of U.S. Treasury checks. Guzman-Hidalgo was initially indicted in June 2018.

                              According to the indictment, from about May 2012 to September 2017, Guzman-Hidalgo and his co-conspirators knowingly and willfully conspired to steal Government funds, namely from the Internal Revenue Service, and converted them for their own use. The defendants wrongfully obtained U.S. Treasury checks in the names of victims and sold, deposited, or cashed the checks without the victims’ authorization.

                              Also according to the indictment, Guzman-Hidalgo and the other defendants, knowingly used and aided and abetted in the use of names, signatures, addresses, dates of birth, Social Security Numbers, and driver’s license numbers of other individuals, without lawful authority, in connection with the offenses. The defendants cashed and deposited stolen checks into bank accounts that were often opened using stolen identities.

                              Guzman-Hidalgo was sentenced to 22 months’ imprisonment followed by three years of supervised release. He was ordered to pay restitution in the amount of $935,943.03 and a special assessment fee of $100.00.

                              • [1] The facts in this case narrative come from the following publicly available documents: S.D.N.Y. Crim. Judg., filed Feb. 20, 2020, S.D.N.Y. Indict., filed Jun. 18, 2018, S.D.N.Y. Crim. Compl., filed May 16, 2018, and USA v. Guzman-Hidalgo, et. al., History, printed Apr. 22, 2020.


                              • Florida Woman Pled Guilty to Conspiracy to Launder Money [1]

                                On April 24, 2020, in the Southern District of Florida, Jacquelyn Shafran pled guilty to one count of conspiracy to launder money. Shafran was initially charged in February 2020.

                                According to the court documents, from about April 2017 through about November 2017, Shafran, a resident of Broward County, Florida, conspired with others to launder money derived from a wire fraud scam. The wire fraud scam involved various individuals who called victims and pretended to be employees of various Government agencies. They falsely told victims that they owed back taxes with compounded interest and fees, or that their Social Security Number was used to perpetrate illegal activity and they needed to pay money to clear their name. The callers told the victims that if they did not make immediate payments they would be arrested.

                                As part of the conspiracy, Shafran provided her bank account information to receive funds from victims of the schemes, in exchange for a percentage of the deposited money. In addition, Shafran recruited others in the South Florida area to open multiple bank accounts, in order to receive money that she knew was derived from criminal activity. In exchange for recruiting others to open bank accounts, Shafran also received a percentage of the tainted money deposited into their accounts.

                                Shafran and her coconspirators made sure to withdraw the stolen funds within hours of deposit by the victims. Shafran lied to law enforcement and told others to lie about the nature of the deposits, if questioned by bank employees. Despite one of her bank accounts being closed for fraud, and the bank accounts of those she recruited being closed for fraud as well, Shafran continued to recruit others and received money for their participation in the scheme.

                                Shafran faces a statutory maximum term of imprisonment of up to 20 years, followed by a term of supervised release of up to three years, and a court imposed fine of up to $500,000.00, or double the gross proceeds from the scheme.

                                • [1] The facts in this case narrative come from the following publicly available documents: S.D. Fla. Super. Infor., filed Feb. 20, 2020; S.D. Fla. Plea Agr., filed Apr. 24, 2020; and S.D. Fla. Factual Agr., filed Apr. 24, 2020.


                                • Man Arrested for Theft of U.S. Mail Containing Economic Impact Payments [1]

                                  On April 29, 2020, in the Eastern District of New York, Feng Chen was charged with theft of mail, including multiple economic impact payments from the United States Treasury Department, otherwise known as “stimulus payments.” The arrest was announced by the U.S. Attorney for the Eastern District of New York, the Treasury Inspector General for Tax Administration, the United States Postal Inspection Service, and the New York Police Department (NYPD).

                                  According to the court documents, on April 28, 2020, NYPD police officers observed a man, later identified as Chen, looking inside a medical collection bin at a closed medical office, and then walking to a nearby residential building and examining mail left at the door. Chen continued to walk to another residential building, carrying what appeared to be mail. He discarded the mail he was holding when he saw the police officers. When questioned, Chen made contradictory statements and was discovered to have an outstanding arrest warrant for a criminal case involving identity theft. While conducting a search of Chen incident to arrest, the officers recovered United States Treasury checks totaling more than $12,000, credit cards, and opened envelopes and letters bearing the names of various individuals and addresses.

                                  If convicted, Chen faces a maximum of five years imprisonment.

                                  • [1] The facts in this case narrative come from the following publicly available documents: E.D.N.Y. Press Rel., issued Apr. 29, 2020 and E.D.N.Y., Crim. Comp., filed Apr. 29, 2020.


                                  • Man Indicted for Retaliating Against IRS Employee by Filing False Lien [1]

                                    On May 12, 2020, in the Southern District of West Virginia, Jeffrey M. Reed was indicted for filing a false lien and encumbrance against the real and personal property of an Internal Revenue Service (IRS) revenue officer due to the performance of official duties by the IRS revenue officer.

                                    According to the court documents, an IRS revenue officer was assigned to collect a tax liability owed to the IRS in excess of $279,000. During the course of the collection activities, the IRS revenue officer sought to garnish Reed’s wages to satisfy a portion of his tax liability. Reed’s employment ended and his former employer mailed a check to the IRS for $598.22, which represented the wage garnishment against him. In May 2015, in Mercer County, West Virginia, Reed filed a false lien against the IRS revenue officer’s real and personal property, for more than $4.9 million dollars, due to the IRS revenue officer performing official duties, collecting Reed’s outstanding tax liability.

                                    If convicted, Reed could face a fine and/or up to 10 years’ imprisonment.

                                    • [1] The facts in this case narrative come from the following publicly available documents: S.D.W.V. Indict., filed May 12, 2020 and 18 U.S.C. § 1521.


                                    • May 19, 2020

                                      Five Individuals Indicted for Their Roles in Defrauding Elderly Victims of More Than $4 Million [1]

                                      On March 11, 2020, in the District of Connecticut, Farouq Fasasi, Rodney Thomas Jr., Montrell Dobbs Jr., Stanley Pierre, and Ralph Pierre were charged in an 11-count indictment for their alleged participation in a lottery and romance scam. The indictment includes charges of conspiracy to commit mail and wire fraud, mail fraud, conspiracy to commit money laundering, and money laundering.

                                      According to the indictment, on or around August 2015 and continuing through March 11, 2020, Fasasi, Thomas Jr., and coconspirators, as part of a scheme to defraud others, used various scams, including lottery and romance scams, to fraudulently induce primarily elderly victims to provide money, gifts, or personal details. In a lottery scam, scammers notify victims by telephone, through online communications, or by mail that they have won the lottery. The victims are then told that, in order to collect the prize, they must pay fees, including taxes. One of the victims, a resident of Colorado, was made to believe that he or she had to pay money for fees and a tax to the Internal Revenue Service (IRS) in order to receive the winnings.

                                      In a romance scam, scammers take advantage of people looking for companionship by pretending to be prospective companions. Scammers create fake online profiles on dating websites that include false personal details. Once they gain the victim’s trust, the scammers ask the victims for money, falsely claiming to need money for medical or business emergencies, for travel to see the victim, or for other purposes. It is alleged that members of the conspiracy defrauded victims of more than $4 million.

                                      Fasasi and Thomas Jr., are charged with one count of conspiracy to commit mail and wire fraud and one count of mail fraud, and each charge carries a maximum prison term of 20 years. All five defendants could also face a maximum penalty of 10 years’ imprisonment on the charge of conspiracy to commit money laundering. Fasasi, Dobbs, Stanley Pierre, and Ralph Pierre are charged with one or more counts of money laundering, which carries a maximum penalty of 10 years’ imprisonment on each count.

                                      • [1] The facts in this case narrative come from the following publicly available documents: D.Conn. Indict. filed March 11, 2020; and D.Conn. DOJ Press Release dated March 13, 2020.


                                      • Individual Sentenced in Scheme Involving Stolen Tax Documents and U.S. Treasury Check [1]

                                        On March 18, 2020, in the Western District of Michigan, Zachary Thomas was sentenced in a scheme involving bank fraud and identity theft. In November 2019, Thomas pled guilty to bank fraud, aggravated identity theft, and passing a U.S. Treasury check with a false or forged endorsement.

                                        According to the indictment, between July 2018 and October 2018, Thomas and his coconspirators stole mail from mailboxes, including replacement checks from financial institutions, bank account checks, driver’s licenses, social security account number cards, tax documents, and other documents containing personal identifying information. As part of the scheme, Thomas would alter the name of the payee on stolen checks and forge the names of accountholders on the checks, or otherwise falsely endorse them. In August 2018, Thomas, with an intent to defraud, passed a U.S. Treasury tax refund check with a face value of $141,073.89, made payable to a third party and bearing a forged endorsement and signature.

                                        In furtherance of the scheme, Thomas opened accounts at various financial institutions using the names of the individuals whose personal identifying information was stolen as part of the scheme. Thomas would deposit the stolen checks into various accounts, using automated teller machines (ATMs) and his phone through the financial institutions’ mobile deposit application. Thomas would withdraw funds at various ATMs and purchase goods using debit or credit cards associated with the accounts before the financial institutions discovered the checks were fraudulent.

                                        Thomas was sentenced to 78 months’ imprisonment followed by four years’ supervised release. He was also ordered to pay $29,415.32 in restitution and a special assessment fee of $300.

                                        • [1] The facts in this case narrative come from the following publicly available documents: W.D. Mich. Indict. filed Oct. 8, 2019; W.D. Mich. Plea Agr. filed Nov. 27, 2019; and W.D. Mich. Judgment filed Mar. 19, 2020.


                                        • Individual Charged With Bribery of IRS Revenue Agent [1]

                                          On February 28, 2020, in the Northern District of Georgia, Dauda Saibu was charged with bribery of an Internal Revenue Service (IRS) revenue agent.

                                          According to the court documents, from October 11, 2019 to October 23, 2019, Saibu corruptly gave, offered, and promised to pay the revenue agent, with the intent to influence an official act, by offering to pay and then paying the revenue agent to falsify the results of his 2014 Federal income tax return audit.

                                          On October 11, 2019, Saibu met with the revenue agent to discuss his 2014 tax return. At the end of that meeting, Saibu attempted to give the revenue agent a cash bribe. The revenue agent properly reported the bribe offer and agreed to work with Federal law enforcement authorities.

                                          On October 22, 2019, Saibu had two meetings with the revenue agent to discuss the results of the IRS's audit. During these meetings, Saibu proposed that if the revenue agent reduced his tax liability to 20% of the actual amount owed, Saibu would pay the revenue agent a $10,000 cash bribe. To memorialize the offer, Saibu wrote: (a) "$10,000" on a piece of paper and gave it to the revenue agent; and (b) "20% of the total amount I owed $187,000" on another piece of paper. After a brief negotiation, Saibu offered to pay the revenue agent an additional $5,000, for a total of $15,000.

                                          On October 23, 2019, Saibu met with the revenue agent and paid the revenue agent $10,000 in cash in exchange for reducing the amount he owed in back taxes from approximately $187,000 to $47,485.33. Saibu also confirmed that he would pay the revenue agent an additional $5,000 at a later date.

                                          If convicted, Saibu could face a maximum statutory sentence of 15 years’ imprisonment.

                                          • [1] The facts in this case narrative come from the following publicly available documents: N.D. Ga. Information filed Feb. 28, 2020.


                                          • IRS Employee Sentenced for Wire Fraud and Theft of Public Money [1]

                                            On March 20, 2020, in the Middle District of Tennessee, Internal Revenue Service (IRS) employee Tracey Allison was sentenced for wire fraud and theft of Government property in connection with a scheme to fraudulently obtain paid military leave and other benefits from the IRS. Allison was indicted for these and other offenses on March 6, 2019.

                                            According to the indictment, Allison has been employed with the IRS in Franklin, Tennessee, since October 2007. From about November 2013 through about October 2018, Allison knowingly devised a scheme to defraud and to obtain money by means of false pretenses, willingly stole property belonging to the United States, and unlawfully used one or more means of identification of another without authority.

                                            Specifically, between 2013 and 2018, Allison regularly submitted fraudulent and forged Department of the Army Forms 1380 (DA 1380) to the IRS payroll unit seeking payment for military duties. Allison, however, was discharged from the U.S. Army Reserve in August 2012, and did not enlist in the Tennessee National Guard until July 2018. Consequently, she had no military duties for the dates listed on the forms. In furtherance of Allison’s scheme, she forged the name, title, and Department of Defense identification number of her former station commander on the Forms DA 1380. Yet, her former station commander was a military retiree who ceased supervising Allison around July 2013. Allison was not authorized to use the former station commander’s personal identifiers.

                                            In all, Allison submitted approximately 70 false, fraudulent, and forged Forms DA 1380 to the IRS. As a result of the false submissions, Allison collected payments and benefits totaling approximately $22,846.24.

                                            Allison was sentenced to time served, or one day of imprisonment, followed by two years’ supervised release. She was also ordered to pay restitution in the amount of $22,846.24 and a special assessment fee of $200.

                                            • [1] The facts in this case narrative come from the following publicly available documents: M.D. Tenn. Indict., filed Mar. 6, 2019 and M.D. Tenn. Judg., filed Apr. 2, 2020.


                                            • April 23, 2020

                                              Individual Sentenced in Scheme Involving U.S. Treasury Checks [1]

                                              On February 26, 2020, in the Southern District of New York, Oris Sanchez Olivo was sentenced to two counts of bank fraud for her role in a scheme involving U.S. Treasury checks. In June 2019, Sanchez Olivo was indicted for conspiracy to commit bank fraud, bank fraud, and aggravated identity theft.

                                              According to the court documents, from at least September 2017 up to and including about December 2018, Sanchez Olivo and Danibel Luis knowingly and willfully executed a scheme to defraud financial institutions by making deposits that were then insured by the Federal Deposit Insurance Corporation and by depositing fraudulently endorsed checks into bank accounts from which they then withdrew funds to which they were not entitled. They deposited U.S. Treasury checks into the accounts. According to the court documents, it is estimated that Sanchez Olivo and Luis opened or accessed approximately 23 bank accounts as part of the scheme and endorsed and deposited checks totaling approximately $418,175, which belonged to others.

                                              Sanchez Olivo was sentenced to three months’ imprisonment followed by three years’ supervised release, three months of which will be served under home confinement. Sanchez Olivo was further ordered to pay $60,039.44 in restitution and a special assessment of $100.

                                              • [1] The facts in this case narrative come from the following publicly available documents: S.D.N.Y. Complaint filed April 17, 2019; S.D.N.Y. Indict. filed June 28, 2019;; and S.D.N.Y. Judgment filed March 4, 2020.


                                              • Man Pleads Guilty to Wire Fraud in Connection With IRS Telephone Scam [1]

                                                On March 4, 2020, in the Northern District of Georgia, Joish Patel pled guilty to wire fraud in connection with a scheme to defraud U.S. citizens.

                                                According to the court documents, Patel used a call center in connection with a scheme to defraud U.S. residents by misleading them into sending money in connection with several different scams. In one of the scams, Patel and his coconspirators impersonated Internal Revenue Service (IRS) officers to defraud U.S. residents by misleading them into believing that they owed money to the IRS and would be arrested if they did not pay immediately. At least 160 victims received calls during which they were defrauded. The victims sent money via money transmitters such as Western Union®, MoneyGram®, and Ria Financial®. As part of the scheme, Patel retrieved more than $150,000.00 in cash payments of scammed funds from money transmitters using various aliases.

                                                Patel may face a maximum statutory penalty of 20 years’ imprisonment for wire fraud. He also faces a fine of up to $250,000 or twice the gain or loss, whichever is greater. The defendant agreed to make full restitution of $158,911.99 for distribution to the victims. Sentencing in this matter is scheduled for June 4, 2020.

                                                • [1] The facts in this case narrative come from publicly available documents, filed in the N.D.Ga., as follows: Indictment, filed Mar. 5, 2019; and Plea Agreement, filed Mar. 4, 2020.


                                                • IRS Employee Sentenced for Theft of U.S. Property [1]

                                                  On February 13, 2020, in the District of New Jersey, Vire McCants pled guilty, and sentencing was held on the charge of theft of U.S. property for embezzling and knowingly converting to her own use money of an agency of the United States, specifically, paid leave payments received from the Internal Revenue Service (IRS), to which she was not entitled. McCants was charged for the offense in November 2019.

                                                  According to the court documents, McCants was employed as an IRS revenue officer. Between on or about March 6, 2019 and on or about June 8, 2019, on every Wednesday she did not appear for work as scheduled. McCants told her IRS supervisors that she had been selected for grand jury duty. In support of that claim, McCants submitted weekly forms, purportedly signed by the grand jury coordinator. These forms purported to certify that McCants had appeared for grand jury service on each Wednesday during the relevant period. Although McCants was called for grand jury duty, she was not selected as a grand juror and did not appear again for grand jury. McCants was paid by the IRS for each of the days that she submitted time entries for administrative leave, based on her fraudulent claims of grand jury duty obligations. As a result, McCants fraudulently received compensation from the IRS to which she was not entitled for each of those days.

                                                  McCants was sentenced to one year of probation. She was further ordered to pay $4,132.33 in restitution to the IRS and a special assessment fee of $25.

                                                  • [1] The facts in this case narrative come from the following publicly available documents: D.N.J. Crim. Complaint filed Nov. 13, 2019; D.N.J. Minutes of Proceedings filed Feb. 13, 2020; and D.N.J. Judgment filed Feb. 14, 2020.


                                                  • Man Sentenced for Conspiracy to Commit Wire Fraud [1]

                                                    On January 22, 2020, in the Northern District of Georgia, Rodrigo Leon-Castillo was sentenced for conspiracy to commit wire fraud. According to court documents, Leon-Castillo engaged in a scheme involving extorting money from victims in the United States by often times purporting to be agents of the Internal Revenue Service (IRS) who threatened to arrest victims who did not pay alleged tax debts. Leon-Castillo and his coconspirators were indicted for the offense in September 2018, which Leon-Castillo pled guilty to the offense in September 2019.

                                                    From about August 2013 through May 2018, Leon-Castillo and the codefendants operated call centers primarily in and around Ahmedabad, Gujarat, India, and used multiple IRS impersonation call scripts and payday loan scripts outlining what to say to each victim that they contacted. The coconspirators instructed victims to go to banks or automated teller machines to withdraw money, use the money to purchase prepaid sored value cards from retail stores, and then provide the unique serial number of the prepaid stored value cards to purported government officials.

                                                    Leon-Castillo and the coconspirators directed victims to wire scammed funds to money services, such as MoneyGram® or Western Union® , to the attention of fictitious names and U.S. based defendants and their coconspirators. They then retrieved the money, sometimes using false identification in the fictitious names, and they subsequently deposited the victim-scammed funds into United States bank accounts of individuals and businesses.

                                                    Leon-Castillo was sentenced to 51 months’ imprisonment and three years of supervised release. He was ordered to pay $833,938.20 in restitution and a $200 special assessment.

                                                    • [1] The facts in this case narrative come from the following publicly available documents: N.D. Ga. Indict. filed Sept. 4, 2018; N.D. Ga. Plea Agreement filed Sept. 17, 2019; and N.D. Ga. Judgment filed Jan. 23, 2020.


                                                    • Business Owner Sentenced for Aiding and Assisting in the Preparation of Materially False Income Tax Returns and Obstructing the Due Administration of the IRS [1]

                                                      On February 14, 2020, in the Eastern District of Pennsylvania, Myles Hannigan was sentenced for obstructing the due administration of the Internal Revenue Service (IRS) and aiding and assisting in the preparation of materially false income tax returns. Hannigan was charged for the offenses in July 2019.

                                                      According to the court documents, Hannigan owned and operated Payroll Professionals, Incorporated (PPI), located in Media, Pennsylvania. PPI is a third-party payroll processor that assists its clients by handling certain payroll services, including issuing payroll checks for its taxpayers/clients and forwarding tax payments to the Federal, State, and local authorities.

                                                      On over 100 of the Forms 941, Employer’s Quarterly Federal Tax Return, that Hannigan prepared and filed for taxpayers/clients for the Tax Years 2011, 2012, 2013, 2014, and 2015, he followed a practice of falsely overstating deposits that he made to pay taxes owed by his taxpayer/clients to the IRS. Specifically, on Form 941, Line 11, Hannigan reported depositing more money to pay tax debt than he actually sent to the IRS, causing victims collectively to underpay the IRS approximately $3,270,566.89 for those tax years. Additionally, Hannigan concealed from his taxpayers/clients that taxes had not been paid by preparing and presenting bogus documents to some PPI clients that falsely reported that taxes were paid to the IRS. Hannigan impeded the efforts of the IRS to contact his taxpayers/clients about tax delinquencies by re-routing IRS notices from his clients’ business addresses to PPI’s business address.

                                                      Hannigan was sentenced to 52 months’ imprisonment followed by one year of supervised release. He was further ordered to pay $3,270,566.89 in restitution and a special assessment of $1,800.

                                                      • [1] The facts in this case narrative come from the following publicly available documents: E.D. Pa. Information filed July 2, 2019; and E.D. Pa. Judgment filed Feb. 18, 2020.


                                                      • April 2, 2020

                                                        Man Arrested for his Role in Nationwide IRS Impersonation Scheme [1]

                                                        On January 27, 2020, Ronnell Taylor, Jr. was arrested. Taylor had previously been indicted in the Western District of Pennsylvania for wire fraud conspiracy on January 16, 2020.

                                                        According to the indictment, the conspiracy involved impersonators calling victims across the United States and impersonating employees from the Internal Revenue Service (IRS). The IRS impersonators left voicemails instructing victims to contact the IRS at specific phone numbers. When unsuspecting victims called the numbers provided, their calls were automatically forwarded to Voice over Internet Protocol (VoIP) phone numbers and routed to the IRS impersonators, who then extorted money from the victims to pay alleged tax debts.

                                                        Beginning in March 2016 and continuing through August 2017, Taylor and his codefendants, Michael Galanis and Barry Nealer, activated Subscriber Identity Module (SIM) cards and programmed prepaid cell phones to automatically forward calls to VoIP phone numbers. Taylor supplied the codefendants with prepaid SIM cards to activate and instructed his codefendants on how to activate them and program the cell phone numbers associated with the SIM cards to forward calls to VoIP phone numbers.

                                                        Victims were called by an IRS impersonator, who directed victims to wire money, purchase stored value cards, purchase iTunes gift cards, purchase Target retail store gift cards, or purchase gift cards to pay alleged tax debts. The IRS impersonators defrauded victims in amounts totaling approximately $89,000.

                                                        On January 27, 2020, Taylor made his initial appearance and was released on a $20,000 unsecured bond. Additional legal actions are pending.

                                                        • [1] The facts in this case narrative come from the following publicly available documents: W.D. Pa. Indict. filed Jan. 16, 2020; and W.D. Pa. Record of Magistrate’s Proceedings, filed Jan. 28, 2020.


                                                        • IRS Employee Sentenced for the Unauthorized Disclosure of Suspicious Activity Reports [1]

                                                          On January 15, 2020, in the Northern District of California, Internal Revenue Service (IRS) employee John C. Fry was sentenced for the unauthorized disclosure of Suspicious Activity Reports (SARs). Fry previously pled guilty to the offense in August 2019.

                                                          According to the court documents, Fry is an investigative analyst for IRS Criminal Investigation (IRS-CI) in San Francisco, California, and has worked for the IRS since 2008. In this position, he had access to various law enforcement databases, including the Financial Crimes Enforcement Network (FinCEN) and Palantir, which is an analytic software used by IRS-CI. FinCEN manages the collection and maintenance of SARs, which financial institutions are required to generate under the Bank Secrecy Act to report potentially suspicious financial transactions. The disclosure of a SAR or its contents is unlawful, and employees or agents of Government authorities are prohibited from disclosing a SAR, or any information that would even reveal the existence of a SAR, except as necessary to fulfill official duties.

                                                          Fry admitted that on May 4, 2018, he logged on to the Palantir database from his work computer and downloaded five SARs related to Michael Cohen and his company, Essential Consultants. Fry then called Michael Avenatti, an attorney based in Newport Beach, California, twice from his personal cell phone. During those conversations, Fry verbally provided information contained in the five SARs to Avenatti. Fry also used one of his personal e-mail accounts to e-mail screenshots of the SARs to Avenatti. Fry admitted that on May 7, 2018, he logged on to the FinCEN database from his work computer and conducted additional searches related to Cohen and Essential Consultants. He then called Avenatti from his personal cell phone and verbally provided information contained in the searches. Fry admitted that he had no official reason in his capacity as an IRS investigative analyst to disclose SAR records related to Cohen or the various companies listed in the SARs.

                                                          On May 8, 2018, Avenatti circulated a dossier on his public Twitter account releasing the confidential banking information related to Cohen and Essential Consultants. On May 8, 2018, The Washington Post published an article that discussed in detail claims about Cohen’s banking history made public in Avenatti’s dossier. On May 12, 2018, Fry placed an outgoing call to a number later identified as being associated with a reporter. On May 16, 2018, The New Yorker published an article written by this reporter titled, “Missing Files Motivated the Leak of Michael Cohen’s Financial Records.” The article reported that the source, identified only as a law enforcement officer, grew alarmed after being unable to find two important SARs regarding Cohen’s financial activity. In fact, access to the two SARs in question had been restricted and they were not available to all FinCEN users.

                                                          Fry was sentenced to five years’ probation, including six months of electronic monitoring, for the unauthorized disclosure of SARs. Fry was also ordered to pay a fine in the amount of $5,000.00.

                                                        • [1] The facts in this case narrative come from the following publicly available documents: N.D. Cal. Crim. Compl. filed Feb. 4, 2019; N.D. Cal. Indict. filed Feb. 28, 2019; N.D. Cal. Plea Agr. filed Aug. 14, 2019; N.D. Cal. Crim. Minutes filed Jan. 15, 2020; and N.D. Cal. Judgement filed Jan. 16, 2020.


                                                        • Man Sentenced in Scheme Involving Stolen Tax Refund Checks [1]

                                                          On January 22, 2020, in the Western District of Missouri, Dante Chestnut was sentenced in a scheme involving stolen U.S. Treasury tax refund checks. In July 2019, Chestnut pled guilty to conspiracy to commit bank fraud, bank fraud, and aggravated identity theft.

                                                          According to the court documents, Chestnut and seven other individuals, Branden Belvin, Mistie Smith, Frances Wright, Susannah Lesaisaea, Cassandra Franklin, Sharieff Sylvester, and Joseph Hooks, were indicted on May 2, 2018, in a scheme involving the theft of U.S. Treasury tax refund checks. Dante Chestnut was charged with conspiracy, bank fraud, aggravated identity theft, possession of stolen mail, and money laundering.

                                                          According to the plea agreement, Chestnut’s coconspirators Belvin and Smith unlawfully obtained U.S. Treasury tax refund checks that belonged to other persons and that had been stolen from the U.S. mail. Belvin, Smith, and their coconspirators, including Chestnut, also obtained fraudulent drivers licenses and identification cards to use with the stolen U.S. Treasury checks. Using fraudulent identification documents, the coconspirators presented the stolen U.S. Treasury checks to open bank accounts and withdraw funds at various branches of Academy Bank, a financial institution, in the states of Arizona, Colorado, Kansas, and Missouri.

                                                          Chestnut used a fraudulent identification to negotiate a stolen U.S. Treasury check to deposit into a newly created bank account. Chestnut’s actions were captured on an Academy Bank video surveillance camera, and his fingerprints were identified on a check that was recovered from Academy Bank.

                                                          Chestnut cashed twenty-three U.S. Treasury tax refund checks, totaling $115,760, in this manner. Twenty-one of these transactions were captured on bank security video, including a transaction on May 6, 2016, at an Academy Bank located in Kansas City, Missouri. In addition, Chestnut’s fingerprints were discovered on checks passed by coconspirators Lesaisaea, Franklin, and Hooks.

                                                          According to the indictment, the scheme resulted in the fraudulent negotiation of approximately 99 checks, representing a total financial loss of approximately $447,517.

                                                          Chestnut was sentenced to 62 months’ imprisonment, followed by three years’ supervised release. Chestnut was also ordered to pay $441,056.27 in restitution and a special assessment fee of $300.

                                                          • [1] The facts in this case narrative come from the following publicly available documents: W.D. Mo. Indict. filed May 2, 2018; W.D. Mo. Plea Agr. filed July 25, 2019; W.D. Mo. Judgment filed Jan. 22, 2020.


                                                          • Man Sentenced for Accessing IRS System and Obtaining Taxpayer Information [1]

                                                            On January 13, 2020, in the Northern District of West Virginia, Clinton Jean-Pierre of Miami, Florida, was sentenced for aggravated identity theft and accessing a computer and obtaining information from the Internal Revenue Service (IRS) eAuthentication online taxpayer system. Jean-Pierre was charged with the offenses in July 2019 and pled guilty in August 2019.

                                                            According to a U.S. Department of Justice press release, Jean-Pierre admitted to fraudulently accessing the IRS eAuthentication online taxpayer system in December 2017. Jean-Pierre admitted that in order to pass IRS security protocols, he had fraudulently “ported” an unknowing person’s cellular telephone number to his own phone in order to obtain the security code necessary to create an unauthorized taxpayer account. Once in the IRS eAuthentication system, Jean-Pierre admitted that he gained access to a taxpayer’s tax return information, which included the taxpayer’s personal identifying information.

                                                            Jean-Pierre was sentenced to a mandatory 24 months’ imprisonment for aggravated identity theft and 46 months’ imprisonment for computer fraud, to be served consecutively, for a total of 70 months’ imprisonment, followed by three years of supervised release. In addition, Jean-Pierre was ordered to pay a special assessment fee of $200.

                                                            • [1] The facts in this case narrative come from the following publicly available documents: N.D.W.V. Information filed Jul. 30, 2019; N.D.W.V. Plea Agr. filed Aug. 29, 2019; N.D.W.V. DOJ Press Release dated Jan. 13, 2020; and N.D.W.V. Judgment filed Jan. 21, 2020.


                                                            • February 25, 2020

                                                              Indian National Pleads Guilty to Charges in Connection with Operating India-Based Call Centers That Scammed U.S. Victims Out of Millions of Dollars [1]

                                                              On January 9, 2020, in the Southern District of Texas, Hitesh Madhubhai Patel, also known as Hitesh Hinglaj, pleaded guilty to wire fraud conspiracy and conspiracy in connection with his operation of a multimillion-dollar India-based call center scam which targeted U.S. victims.

                                                              According to court documents, Patel was identified as an operator of the India-based call center HGlobal. From about 2013 until about October 2016, Patel and his coconspirators participated in a complex scheme to defraud U.S. victims by misleading them into sending money in connection with several different scams. In one of the scams, the coconspirators impersonated Internal Revenue Service (IRS) officers to defraud U.S. residents by misleading them into believing that they owed money to the IRS, and that they would be arrested and fined if they did not pay the alleged back taxes immediately.

                                                              As part of the scheme, Patel corresponded by e-mail with his coconspirators to send credit card numbers, telephone scam scripts, deposit slips, payment information, call center operations information, and bank account information. The scripts included IRS impersonation, payday loan fraud, U.S. Government grant fraud, and debt collection fraud. Patel admitted that a reasonably foreseeable loss of more than $25 million but less than $65 million was attributable to him.

                                                              Patel was prosecuted in the United States after being extradited from Singapore in April 2019. Singapore authorities had apprehended Patel at the request of the U.S.

                                                              Patel may face a maximum statutory penalty of 20 years’ imprisonment for the wire fraud conspiracy and five years for conspiracy. Both counts also carry the possibility of a fine of up to $250,000 or twice the gross gain or loss from the offense. Sentencing in this matter is scheduled for April 3, 2020.

                                                              • [1] The facts in this case narrative come from the following publicly available documents: S.D. Tex. Superseding Indict. filed Oct. 19, 2016; S.D. Tex. Plea Agr. filed Jan. 9; and DOJ Press Release dated January 9, 2020.


                                                              • Man Pleads Guilty in Connection with an International Impersonation Scheme Targeting U.S. Victims [1]

                                                                On December 12, 2019, in the Eastern District of New York, Armughanul Asar pled guilty to one count of conspiracy to commit wire fraud, in connection with an impersonation and Internet retail scheme directed at thousands of individuals across the United States.

                                                                According to court documents, telemarketing call centers in India placed calls to U.S. victims seeking to defraud them of money by various fraudulent scenarios. Among the fraudulent scenarios was a scam wherein callers contacted the victims and falsely claimed to be agents of U.S. Government agencies, including the Internal Revenue Service (IRS). The callers falsely claimed they were contacting the victims to inform them that they owed the U.S. Government a specified amount of money, and if the victims did not immediately remit payment to the individuals or entities identified by the callers, they would be arrested.

                                                                Between January 2018 and September 2018, Asar and others opened bank accounts in the names of various inactive and shell corporations for the purpose of receiving fraud proceeds. Shortly after receiving the wire transfer payments that the victims sent, the defendants and others withdrew and directed shell company owners to withdraw the fraudulently obtained victims’ funds and then distributed the money via cashier’s checks and wire transfers to other bank accounts. The defendant, together with others, received approximately $2.3 million from the victims as a result of the fraud scheme.

                                                                If convicted, Asar could face criminal forfeiture and a maximum penalty of 20 years’ imprisonment. Sentencing in this matter is scheduled for July 7, 2020.

                                                                • [1] The facts in this case narrative come from the following publicly available documents: E.D.N.Y. Indict. filed Aug. 22, 2019; E.D.N.Y. DOJ Press Release dated Aug. 26, 2019; and E.D.N.Y. Change of Plea Hearing filed Dec. 12, 2019.


                                                                • Man Pleads Guilty to Charges Related to Attempting to Obtain President’s Tax Returns [1]

                                                                  On December 16, 2019, in the Eastern District of Pennsylvania, Justin Hiemstra was sentenced after pleading guilty to two counts arising from his using someone else’s username to access a school computer and attempting to obtain the tax returns of President Donald Trump without permission from the Internal Revenue Service (IRS). Hiemstra and codefendant Andrew Harris were charged with the offenses on July 17, 2019, and pled guilty on August 6, 2019.

                                                                  According to court documents, Hiemstra and Harris, two students at Haverford College, went to the school’s computer lab and attempted to obtain President Trump’s tax returns via the Free Application for Student Aid (FAFSA) website. Hiemstra and Harris opened a false FAFSA application in the name of a member of the Trump family and found that someone else had already obtained a Federal Student Aid identification (FSA-ID) for President Trump and identification password. In general, before beginning one’s very first FAFSA application, an individual registers with the Office of Federal Student Aid (FSA Office). Once registered, the individual obtains a unique identifier, known as a FSA-ID, essentially the equivalent of a username. Once the individual has activated the FSA-ID, the individual can complete the first FAFSA application and any subsequent applications through the FAFSA website.

                                                                  In order to reset the identification password, Hiemstra and Harris were required to answer challenge questions that the other person had originally created when first setting up the FSA-ID and password. They were able to do so and reset the password. Using President Trump’s personal identifiers, including his Social Security Number and date of birth, Hiemstra and Harris unsuccessfully attempted to import President Trump’s Federal tax information into the false FAFSA application that they had initiated in the name of a Trump family member.

                                                                  When questioned by law enforcement, Hiemstra stated that credentials from two other Haverford College students were used to access the two computers that he and Harris used.

                                                                  Hiemstra was sentenced to two years on each of two counts, to run concurrently, and probation. He was further ordered to complete 200 hours of community service and to pay a $50.00 special assessment.

                                                                  • [1] The facts in this case narrative come from the following publicly available documents: E.D. Pa. Information filed July 17, 2019; E.D. Pa. Gov. Plea Memorandum filed Aug. 5, 2019; E.D. Pa. Crim. Dockets as of Aug. 8, 2019; and E.D. Pa. Judgment filed Dec. 18, 2019.


                                                                  • Florida Tax Preparer Sentenced in Scheme Involving Wire Fraud [1]

                                                                    On December 5, 2019, in the Southern District of Florida, Fort Lauderdale tax preparer Deborah Thomas was sentenced after previously pleading guilty to three counts of wire fraud in connection with a scheme to misappropriate her clients’ monies, which had been intended to satisfy taxes owed to the Internal Revenue Service (IRS). Thomas was indicted for the offenses in May 2019 and pled guilty in August 2019.

                                                                    According to the indictment, from April 2015 through May 2018, Thomas worked as a tax preparer at a public accounting firm. In an effort to unjustly enrich herself, she registered Global Business Concepts, LLC (operating as U.S. Treasures). She subsequently opened a bank account in the name of that business, where she then deposited fraudulently obtained checks.

                                                                    Thomas instructed some of her clients who owed money to the IRS to write checks payable to “U.S. Treasury.” She then had the checks stamped or altered, making it difficult to see the last letters of the payee. Thomas instructed other clients, whose primary language was not English, to make checks payable to “U.S. Treasures” or “U.S. Treasure.” Thomas did not give those client checks to the IRS but instead deposited them into her U.S. Treasures account through automated teller machines in Fort Lauderdale, Florida. Images of the deposited checks were then transmitted via wire communication to servers located in Richardson, Texas, allowing them to be credited to Thomas’ own business bank account. The fraudulent proceeds obtained by Thomas totaled more than $654,779.

                                                                    Thomas was sentenced to 108 months in Federal prison and four years of supervised release. She was further ordered to pay over $5.1 million in restitution.

                                                                    • [1] The facts in this case narrative come from the following publicly available documents: S.D. Fla. Indict. filed May 16, 2019; S.D. Fla. Plea Agr. filed Aug. 19, 2019; S.D. Fla. Crim. Docket as of Aug. 21, 2019 and S.D. Fla. Judgment filed Dec. 8, 2019.


                                                                    • January 27, 2020

                                                                      Man Pleads Guilty to Conspiracy to Commit Wire Fraud in Connection With an International Impersonation Scheme Targeting U.S. Victims [1]

                                                                      On November 26, 2019, in the Eastern District of New York, Jamal Zafar pled guilty to conspiracy to commit wire fraud. Zafar and coconspirators had previously been indicted on charges of conspiracy to commit wire fraud and conspiracy to commit money laundering in connection with an impersonation and Internet retail scheme directed at thousands of individuals across the United States.

                                                                      According to the court documents, as part of the scheme, telemarketing call centers in India placed calls to U.S. victims seeking to defraud them of money by various fraudulent scenarios. Among the fraudulent scenarios was a scam wherein callers contacted the victims and falsely claimed to be agents of U.S. Government agencies, including the Internal Revenue Service (IRS). The callers falsely claimed that they were contacting the victims to inform them that they owed the U.S. Government a specified amount of money and, if the victims did not immediately remit payment to the individuals or entities identified by the callers, they would be arrested.

                                                                      Between January 2018 and September 2018, Zafar and others opened bank accounts in the names of various inactive and shell corporations for the purpose of receiving fraud proceeds. Shortly after receiving the wire transfer payments that the victims sent, the defendant and others withdrew and directed shell company owners to withdraw the fraudulently obtained victims’ funds and then distributed the money via cashier’s checks and wire transfers to other bank accounts. The defendant, together with others, received approximately $2.3 million from the victims as a result of the fraud scheme.

                                                                      Zafar consented to the entry of a forfeiture money judgement in the amount of $232,362 and the forfeiture of other property involved in the defendant’s violation.

                                                                      Zafar could face a maximum statutory sentence of 20 years’ imprisonment.

                                                                      • [1] The facts in this case narrative come from the following publicly available documents: E.D.N.Y. Indict. filed Aug. 22, 2019; E.D.N.Y. DOJ Press Release dated Aug. 26, 2019; E.D.N.Y Criminal Cause For Guilty Plea filed Nov. 26, 2019; E.D.N.Y Preliminary Order of Forfeiture filed Dec. 9, 2019; and E.D.N.Y Order of Referral filed Nov. 26, 2019.


                                                                      • IRS Employee Indicted with Access Device Fraud and Aggravated Identity Theft [1]

                                                                        On November 26, 2019, in the Eastern District of Virginia, Kwashie Senam Zilevu was indicted on charges of access device fraud and aggravated identity theft. Zilevu was previously charged via criminal complaint with access device fraud on October 2, 2019, and subsequently arrested by special agents of the Treasury Inspector General for Tax Administration (TIGTA) on October 3, 2019.

                                                                        According to court documents, Zilevu was employed as an Information Technology Specialist with the Internal Revenue Service (IRS). Zilevu owned several businesses, including MacroTele, LLC, which he claimed sold telephone calling cards that he created. Between January 2016 and March 2018, Zilevu knowingly, and without authorization, used the names, addresses, dates of birth, and Social Security Numbers of at least three victims to obtain fraudulent credit cards. Once Zilevu obtained the credit cards in the victims’ names, he used them to make several thousands of dollars of purchases at retail stores and other companies. An American Express (AmEx) application was submitted using a victim’s personally identifiable information (PII) and approximately $49,000 was charged to the AmEx card. Among the purchases were an airline ticket for travel from Washington, D.C., to Miami, Florida, and a hotel reservation for Zilevu.

                                                                        Another credit card application was submitted to U.S. Bank and Trust using PII of a second victim. Bank statements revealed that a total of $10,273.39 in completed transactions and $2,651.62 in attempted transactions were made using this card, including an airline ticket from Dulles, Virginia, to Montego Bay, Jamaica, for Zilevu. Another credit card application was submitted to U.S. Bank and Trust using a third victim’s PII. A total of $9,641.69 in fraudulent charges were made using this card. A review of Zilevu’s IRS e-mail account revealed that Zilevu received an e-mail message from PayPal congratulating the third victim for setting up his or her account and instructing the victim to click a link in order to confirm the accuracy of his or her e-mail address. Zilevu received a subsequent e-mail message from PayPal to his IRS e-mail account advising the third victim that he or she was officially a PayPal member. When interviewed, each of the victims confirmed that the fraudulent credit cards had been taken out in their names, and that Zilevu did not have permission or authority to use their information to apply for the cards.

                                                                        This investigation was worked jointly by special agents from TIGTA and the United States Postal Inspection Service. If convicted, Zilevu could face a fine and up to 15 years’ imprisonment.

                                                                        • [1] The facts in this case narrative come from the following publicly available documents: D. Mass. Crim. Compl. filed October 30, 2019; D. Mass. Executed Arrest Warrant filed October 30, 2019; D. Mass. Crim. Docket as of November 12, 2019.


                                                                        • Woman Sentenced in Scheme Using Stolen Tax Refund Checks [1]

                                                                          On November 26, 2019, in the Western District of Missouri, Frances Wright was sentenced for her role in a scheme involving the theft of U.S. Treasury tax refund checks. In July 2019, Wright pled guilty to bank fraud.

                                                                          According to the court documents, eight individuals were charged in a scheme involving the theft of U.S. Treasury tax refund checks. Branden Belvin, Mistie Smith, Dante Chestnut, Susannah Lesaisaea, Cassandra Franklin, Sharieff Sylvester, Joseph Hooks, and Frances Wright were indicted on May 2, 2018, for conspiracy, bank fraud, and aggravated identity theft.

                                                                          Belvin and Smith, both residents of California, obtained approximately 99 U.S. Treasury checks that had been stolen from the U.S. Postal Service mail stream. The checks had been issued for tax refunds and were printed and mailed in Kansas City, Missouri. Belvin and Smith recruited the codefendants to participate in the scheme by negotiating the stolen checks. They created or obtained fraudulent identification documents, such as driver’s licenses, in order to deposit the stolen refund checks.

                                                                          Between March 2016 and May 2016, the coconspirators traveled through Arizona, Colorado, Kansas, and Missouri negotiating the stolen refund checks at various branches of Academy Bank, a financial institution headquartered in Kansas City, Missouri. The defendants used false identification documents in order to open bank accounts in the names depicted on the checks. They then deposited the checks into the newly created accounts and subsequently withdrew the majority of the money.

                                                                          In April 2016, Denver, Colorado, police officers responded to an incident involving Belvin and Smith at a hotel. Officers recovered an envelope containing 19 counterfeit California driver’s licenses. The names on the counterfeit driver’s licenses matched the names of victims whose tax refund checks had been stolen and cashed, but most of the licenses pictured the same six individuals, coconspirators Chestnut, Sylvester, Franklin, Lesaisaea, Wright, and another individual. The scheme resulted in the fraudulent negotiation of approximately 99 checks representing a total financial loss of approximately $447,517. The aggregate amount of stolen checks presented by Wright totaled $24,970.

                                                                          Wright was sentenced to five years’ probation for committing bank fraud and ordered to pay restitution in the amount of $24,970.

                                                                          • [1] The facts in this case narrative come from the following publicly available documents: W.D. Mo. Indict. filed May 2, 2018; W.D. Mo. Plea Agr. filed July 29, 2019; W.D. Mo. Judgment filed Nov 26, 2019.


                                                                          • Four Individuals Charged in Scheme to Defraud U.S. Government Agencies [1]

                                                                            On November 6, 2019, in the Eastern District of New York, Jack Cabasso, Frances Cabasso, Jonathan Lasker, Alan Schwartz, and Aventura Technologies, Inc. (Aventura), were charged with conspiracy to commit wire fraud and mail fraud, money laundering conspiracy, and unlawful importation.

                                                                            According to the criminal complaint, from between about August 2006 and November 2019, the defendants knowingly and intentionally conspired to devise a scheme to defraud U.S. Government agencies, contractors, and private sector customers by falsely stating that merchandise was made by Aventura and in the United States. As stated in a Department of Justice press release dated November 7, 2019, under Federal Government procurement laws and regulations a product’s country of origin can impact a procurement officer’s decision to purchase a product. In addition, all products imported into the United States must be marked with their country of origin. Over the past decade, Aventura made upwards of $88 million, including over $20 million in Federal Government contracts, while claiming that it was manufacturing its products at its headquarters in Commack, New York. Instead, since at least 2006, Aventura has been importing products primarily from the People’s Republic of China and then reselling them as American-made. According to the complaint, the Department of the Treasury has paid Aventura approximately $16.9 million through September 2019.

                                                                            The defendants also defrauded the U.S. Government by obtaining contracts set aside for women-owned small business under the false pretense that Aventura was controlled by Frances Cabasso when, in fact, Aventura was controlled by Jack Cabasso.

                                                                            If convicted, the defendants could face up to 20 years’ imprisonment on each charge in the complaint.

                                                                            This investigation was worked jointly by the Treasury Inspector General for Tax Administration, the Federal Bureau of Investigation, the General Services Administration Office of Inspector General, the Defense Criminal Investigative Service, the Internal Revenue Service (IRS)- Criminal Investigation, the Air Force Office of Special Investigations, the Naval Criminal Investigative Service, Customs and Border Protection, the Department of Energy Office of Inspector General, the Army Criminal Investigation Division, and the Treasury Office of Inspector General.

                                                                            • [1] The facts in this case narrative come from the following publicly available documents: E.D.N.Y. Crim. Compl. filed Nov 6, 2019; and E.D.N.Y DOJ Press Release dated Nov 7, 2019.



                                                                            • Archives: 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 | 2005 | 2004


                                                                              Recent Spotlight

                                                                              IRS Impersonation Scam Reporting button

                                                                              Report Fraud, Waste, and Abuse button

                                                                              Whistleblower Retaliation Reporting button

                                                                              Contractor Fraud Reporting button

                                                                              FOIA button


                                                                              Search Site
                                                                               



                                                                              Readers and Viewers
                                                                              Adobe Acrobat Reader

                                                                              Links to other sites
                                                                              Treasury Supports Veterans logo




                                                                              Last Updated: September 30, 2020
                                                                              IRS Treasury eGov USAGov: U.S. Government Web Portal Regulations