• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » Man Sentenced for Stealing Millions from U.S. Service Members

Man Sentenced for Stealing Millions from U.S. Service Members

2020-07-10 by Max

Identity Theft Money-Laundering

Identity Theft Scheme Funneled Millions Using PII Taken from an Armed Forces Database

The US Department of Justice sentenced a San Diego man yesterday for his role in an identity theft scheme. Trorice Crawford pleaded guilty to one count of conspiracy to launder monetary instruments last December. He was sentenced to almost four years in federal prison.

Crawford and his accomplices stole millions of dollars from thousands of U.S. service members’ bank accounts after harvesting personally identity information (PII) from an Armed Forces Database. The DOJ said the defendants took between $8,000 to $13,000 from each victim.

Crawford’s role was to recruit and mange the over 30 money mules who helped funnel stolen money to overseas accounts.

One of Crawford’s co-conspirators, Frederick Brown, was a civilian contractor from Las Vegas. Brown worked as a civilian medical records administrator at a U.S. Army installation in South Korea. Brown collected sensitive information about US service personnel and passed it along to his co-conspirators.

READ: Credential Phishing Attack Targets Navy Credit Union Accounts

PII Stolen from Service Personnel Includes:

  • Social Security numbers
  • DOD ID numbers
  • Birthdate
  • Contact information
Motley Fool (Sponsored)

How Identity Theft Happens

Identity theft happens when cybercriminals, scanners, or other unauthorized persons are able to obtain Sensitive information About an individual or business. this includes PII like birthdates and government identification. This information is then used to open New lines of credit including credit cards, bank accounts, or loans. It may also be used to obtain forms of identification Including driver’s licenses or passports. It may also be used to receive medical treatment for government benefits.

Some forms of identity theft may result in a person Losing money from their bank accounts or being responsible for credit card charges. While other forms of identity theft may leave the victim in debt from high medical bills or lines of credit, they didn’t realize were opened using their credentials.

Types of Identity Theft

There are numerous types of identity theft, which is why credit monitoring and identity theft monitoring are so important. Each form of identity theft generally results in financial losses for the victim.

  • Financial Theft – Financial identity theft is when criminals steal money from bank accounts. They use your personal information to reset passwords and log into your online accounts. Money is transferred to a bank account the fraudster controls – usually overseas.
  • Driver’s License Identity Theft – Driver’s license identity theft is when a criminal uses your identity to obtain a driver’s license in one or more jurisdictions.
  • Medical Theft – Medical identity theft is when a scammer uses your identity to receive medical treatment. They may have the treatment billed to your name and address or charge it to your medical insurance, leaving you to pay the deductible portion of the bill.
  • Debit Card Fraud or Credit Card Fraud – Debit card or credit card fraud is when a criminal steals your identity and uses it to open up new credit cards or bank accounts. They may also request credit line increases on your existing loans or credit cards and charge purchases before you realize what has happened. If you wait until your next billing statement, the criminal may have already racked up thousands of dollars in purchases
  • Account Takeover Identity Theft – Account identity theft is when the criminal gains access to your existing online accounts and takes over the accounts by resetting passwords and contact information.

How to Prevent Identity Theft

Using credit monitoring and identity monitoring services can help you identify fraudulent activity as soon as it happens. That way you will know that your personal information is compromised and that your money is at risk. Learn more about identity theft. Check out our posts on identity theft education center to learn more about what you can do to protect your identity and safeguard your money.

Sentencing

Crawford will serve a 46 month prison sentence followed by three years of supervised release. Brown will be sentenced in September after pleading guilty. Three other defendants are in custody in the Philippines. They are awaiting extradition to the United States on charges of conspiracy, wire fraud and aggravated identity theft.

Read more on the story here

Filed Under: News Tagged With: identity theft

About Max

Max is a Data Privacy Coordinator at a major global law firm and a science fiction author residing in the Philadelphia area. He has been writing for https://www.askcybersecurity.com since early 2017.


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version