Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Man Gets Prison Time for Identity Theft Scheme Targeting Veterans
  • Cyber Attacks
  • Data Breach

Man Gets Prison Time for Identity Theft Scheme Targeting Veterans

6 years ago David Bisson
Man Gets Prison Time for Identity Theft Scheme Targeting Veterans

A man received prison time for helping to conduct an identity theft and fraud scheme that targeted thousands of veterans and U.S. service members.

On July 9, the Office of Public Affairs at the U.S. Department of Justice announced that Chief U.S. District Judge Orlando Garcia had sentenced 32-year-old Trorice Crawford of San Diego, California to 46 months in federal prison.

Judge Garcia also ordered Crawford to pay $103,700 in restitution and to serve out three years of supervised release following the completion of his time in prison.

The prison sentence responded to an identity theft and fraud scheme that Crawford helped to facilitate between May 2017 and July 2019.

In that span of time, Crawford’s co-defendant Frederick Brown, age 38 of Las Vegas, NV abused his post as a former civilian medical records administrator for the U.S. Army at the 65th Medical Brigade, Yongsan Garrison, South Korea. He did this by illegally exfiltrating the personally identifiable information (PII) of thousands of U.S. service members. He then sent this data to Robert Wayne Boling, Jr. (a U.S. citizen).

Upon receipt of this data, Boling acted with Allan Albert Kerr (Australian citizen) and Jongmin Seok (South Korean citizen) to authenticate themselves as Brown’s victims on a Department of Defense benefits portal. They subsequently abused their access to attempt to steal money from victims’ bank accounts as well as veterans’ benefits payouts.

That’s where Crawford came in. The San Diego man was responsible for recruiting at least 30 individuals to act as money mules and launder the stolen funds. After keeping a percentage for himself, Crawford oversaw the transfer of those funds to Boling and his co-conspirators in the Philippines.

On December 5, 2019, Crawford confirmed his participation in this scheme by pleading guilty to one count of conspiracy to launder monetary instruments.

Acting Assistant Attorney General Ethan P. Davis of the Department’s Civil Division said that Crawford’s prison sentence reflected the commitment of the Department of Justice to protect U.S. service members and veterans. As quoted in its press release:

The Department of Justice will not tolerate fraud on America’s warfighters and veterans. Working with our partners and using all tools available, we are committed to protecting those who protect us.

Boling, Kerr and Seok were still in the Philippines awaiting extradition to the Western District of Texas at the time of reporting.

After hearing Brown’s guilty plea in October 2019, Judge Garcia had scheduled a sentencing hearing for the Las Vegas resident on September 17, 2020.

The post ” Man Gets Prison Time for Identity Theft Scheme Targeting Veterans” appeared first on TripWire

Source:TripWire – David Bisson

Tags: Encryption, Finance, Goverment, TripWire

Continue Reading

Previous CompTIA Certification Prep Courses – Get Lifetime Access @ 99% Discount
Next Leaked Details of 142 Million MGM Hotel Guests Found for Sale on Dark Web

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

2 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

4 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

4 hours ago [email protected] (The Hacker News)
  • Data Breach

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

20 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

20 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach

When Cloud Outages Ripple Across the Internet

23 hours ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
  • Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
  • CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog
  • http://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
  • [Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT