Fed Bank IT Worker Charged With Insider Data TheftFed Bank IT Worker Charged With Insider Data Theft
IT employee allegedly used administrative access to collect co-workers' personal data and obtain bank loans in their names
April 29, 2009
A former IT analyst at the Federal Reserve Bank of New York and his brother have been arrested for allegedly using employees' personal information to obtain bank loans.
According to a news report, Curtis Wiltshire used his position as an IT staffer to pull personal data, such as photographs and Social Security numbers, from others inside the company.
In February, a bank investigator found two 2006 student loan applications totaling $73,000 in the names of other people on a thumb drive attached to Wiltshire's computer. Wiltshire's brother, Kenneth, also is accused of using fake identities in an attempt to obtain a loan for a boat.
According to the report, a postal inspector investigating loans obtained with fake documents found a mailbox in New Jersey that was opened with a phony driver's license bearing the picture of an FRB-NY employee. The mailbox was allegedly being used by Kenneth Wiltshire to receive documents for a boat loan in someone else's name, according to the news report.
Curtis Wiltshire is charged with bank fraud, fraud in connection with identification documents, and aggravated identity theft. He could get more than 30 years in jail. Kenneth Wiltshire, charged with mail fraud and aggravated identity theft, faces a maximum sentence of 22 years.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
5 Reasons To Move your PKI Deployment to the Cloud