Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

It all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal Revenue Service. In addition to their incarceration, the Alikas will each be responsible to pay restitution to the IRS.

Ultimately, Anthony is to serve 80 months in prison followed by three years of supervision upon release, in addition to paying $1,963,251.75 in restitution for conspiracy to commit money laundering. Sonia was handed down a sentence of 21 months of jail time, also followed by three years of supervision, and an IRS restitution totalling $245,790.08 for structuring cash withdrawals to avoid the required bank reporting. Each pled guilty to their charges.

These sentences were passed after the Alikas were found guilty of laundering $1 million in money stolen from the US Treasury by filing fraudulent forms, specifically income tax returns populated with data stolen from the Get Transcript vulnerability. The Get Transcript function, meant to allow taxpayers to review their past returns with clearly spelled-out information, also allowed the Alikas to obtain the data they needed to make off with their ill-gotten funds.

The Alikas, along with co-conspirators, would purchase prepaid debit cards and registered them to the identities they had stolen, before filing false returns for those identities and receiving the refunds on the prepaid cards. They would then use these cards to purchase money orders, deposit that money into bank accounts, and withdraw their loot in multiple small increments to avoid the bank reporting of the transactions.

This isn’t the first time hackers have used the Get Transcript portal, either. In May of 2015, 100,000 tax accounts were stolen and used to take almost $50 million from the IRS. This is all because the authentication requirements to access the necessary information are flimsy.

Reacting to this case, the United State Department of Justice put out a press release outlining some best practices to keep personal information and accounts as safe and secure as possible.

File Early
A tax refund criminal can’t file a false return if the return has already been filed by the actual individual who should be doing the filing. The longer a return goes without filing, the more opportunity a criminal has to file one fraudulently.

Use Strong Usernames and Passwords
This one goes for any and all online accounts, but especially for those containing information as sensitive as a tax return does. If a close family member could get pretty close to the credentials with a guess, those credentials are nowhere near strong enough.

BONUS TIP: Randomized strings of upper and lower-case letters, numbers, and (if permitted) symbols are the most secure option when selecting a password.

For more tech security information to help keep your data--and yourself--safe, keep coming back to the Total Tech Care blog.

 

Comments 1

Elizabeth Grace on Wednesday, 16 October 2019 08:13

A couple of dollars are purchased for the firing of the goals for the citizens. The manners of the joys and https://www.rushmypapers.me/ are visited for the people. The helping hand is discerned for the tools of ND instruments for the programs. The mode is played for the actual moves for the good characters and creatures for the tournaments for the field for the mutual way for the field.

A couple of dollars are purchased for the firing of the goals for the citizens. The manners of the joys and https://www.rushmypapers.me/ are visited for the people. The helping hand is discerned for the tools of ND instruments for the programs. The mode is played for the actual moves for the good characters and creatures for the tournaments for the field for the mutual way for the field.
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones IT Support Communication Business Continuity Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Virtualization Gadgets Saving Money Holiday Social Media Tech Term Chrome Managed IT Services Automation Managed Service Microsoft Office Computers Facebook Artificial Intelligence Cybercrime Operating System Internet of Things BYOD Mobile Device Management Wi-Fi Networking IT Support Health Hacking Office 365 Covid-19 Telephone Systems Alert Information Technology Information Managed Service Provider Remote Spam BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router Law Enforcement Mobile Computing App History Application Data Breach Password Money Human Resources Encryption Big Data Applications Remote Monitoring Data Storage Patch Management Private Cloud Office Tips Training Managed IT Blockchain Paperless Office VPN Apps How To Remote Computing Mobile Office Government Flexibility Avoiding Downtime Marketing Vulnerability WiFi IT solutions Windows 7 Entertainment Word Website Wireless Budget Bring Your Own Device Servers Data Management Work/Life Balance Gmail Settings Data Security Infrastructure Voice over Internet Protocol Two-factor Authentication Google Drive Mouse HaaS Meetings Vendor Managed Services Conferencing Display Risk Management Scam Hacker Save Time Employee/Employer Relationship USB RMM The Internet of Things Lithium-ion battery Software as a Service Vendor Management Telephone System Staff Cleaning Machine Learning Connectivity Remote Work Firewall End of Support Physical Security Education Virtual Reality Apple Safety HIPAA Sports Social Redundancy Keyboard User Error Data Protection Computer Accessories YouTube Wearable Technology Database Black Market Hard Drives Comparison Retail Remote Workers Instant Messaging Robot Excel CES Processor Document Management Business Intelligence Biometrics Solid State Drive Printer Wireless Technology Downtime Audit Bluetooth Virtual Desktop Worker Business Technology How to Content Management Hard Drive Access Control IT Management Data storage Botnet DDoS Virtual Assistant Automobile Authentication IT Plan SharePoint Computing IT Consultant Computing Infrastructure Unsupported Software Going Green Update Customer Service Charger Humor Environment Compliance Digital Signage Google Docs OneNote Fax Server Computer Care Battery Identity Theft Shadow IT Current Events Telephony Legal SaaS Samsung Procurement Internet Exlporer Workplace Strategy Net Neutrality Value Augmented Reality Network Congestion Help Desk PDF Fraud eWaste Spam Blocking Printing Electronic Medical Records Remote Worker Virus Proactive IT Hiring/Firing Cryptocurrency Unified Threat Management Best Practice Managed Services Provider Monitoring webinar Batteries Experience Cost Management Emergency Cache Amazon Web Services Tip of the week Professional Services Windows 8.1 Public Cloud Digitize Managing Stress Social Networking Employer Employee Relationship Safe Mode Scalability Criminal Windows Server 2008 R2 Business Owner Hosted Computing Assessment GDPR Customer relationships Wireless Internet Cameras Online Shopping NarrowBand Windows Server 2008 Tools Email Best Practices Running Cable IT Assessment File Sharing Manufacturing Search Memory Inventory iPhone Specifications Television Camera Computer Tips Managed IT Service Wire Security Cameras Evernote Travel Virtual CIO OneDrive Biometric Security Files Millennials Peripheral Public Computer Printers Digital Security Cameras Using Data Transportation Smart Office Printer Server Wireless Charging Chromecast Regulations Computer Fan Copiers Rootkit 5G Science Colocation Workforce Uninterrupted Power Supply Quick Tip Virtual Private Network Ergonomics Workers Benefits Smartwatch Cables Monitor Distributed Denial of Service FENG Development Customer Relationship Management OLED Virtual Machine Analyitcs Nanotechnology Telecommuting PCI DSS IBM Project Management 2FA Fiber Optics Programming Smart Technology Employee Cortana Flash Reputation Streaming Media Messaging Cabling Digital Signature Hypervisor Content Tech Support Software Tips Policy Supercomputer Warranty Dark mode Antivirus Emails Trend Micro HVAC Techology Google Apps Laptop Sync Customers SMS Default App Windows 8 Analysis Administrator Saving Time Audiobook Consultant Devices Procedure IT service dark theme Netflix Shopping Two Factor Authentication Enterprise Content Management Google Search Analytics Touchpad Accountants Root Cause Analysis AI MSP IT Infrastructure Tablet Knowledge Microchip Politics Best Available Music Thought Leadership Bing Advertising Credit Cards HBO FinTech Domains Skype Social Network WIndows 7 Password Management Password Manager Multi-Factor Security Notifications IaaS Data loss Maintenance Investment Leadership Search Engine Employee/Employer Relationships Bloatware Troubleshooting Twitter Outlook Employees Start Menu Windows 365 NIST ISP Business Mangement Tablets Smart Tech Relocation Trending Screen Mirroring Video Conferencing Loyalty ROI Bitcoin Entrepreneur Books Addiction Shortcuts Amazon Frequently Asked Questions Sales Mobile Point of Sale Windows 10s Personal User Cryptomining Video Games PowerPoint Recycling Windows Media Player Practices Cast Supply Chain Management Shortcut Wiring Worker Commute

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code