logo
Police: Couple withdrew funds from missing disabled adult

Police: Couple withdrew funds from missing disabled adult

Yahoo21-05-2025

ELKHART — An Elkhart couple is accused of spending thousands of dollars belonging to a mentally disabled woman around the time she was reported missing.
Debra Collins and Loni Collins are each charged with a count of fraud as a Level 5 felony for allegedly spending money out of an account meant to pay for the care of a 68-year-old special needs adult. They are also charged with theft as a Level 6 felony.
Warrants for their arrest were issued May 9 with bond set at $50,000 each.
According to court documents:
The victim was reported missing on March 10 and the Elkhart Police Department issued an alert seeking information on April 30. An investigator with Adult Protective Services also began looking into her disappearance.
Debra Collins had been granted permanent guardianship of the victim in 2010 due to the woman's mental disabilities. Collins was ordered to obtain court approval before spending more than $1,500 of the victim's money or to move house, according to the APS investigator.
Debra Collins opened a representative payee account at a bank in August 2020 to deposit the victim's Social Security payments and cover her expenses. The victim was placed in a group home in October 2021 but Collins removed her in July 2022, according to the investigator.
The investigator obtained bank records from the start of January to the end of March allegedly showing that Debra Collins withdrew $2,959 from the woman's account and transferred it to an account owned by her husband. The money was allegedly spent at Amazon, Kroger, Walmart and other internet-based vendors.
No payments were made to care facilities, group homes or other services that would be connected to the victim, according to the investigator.
Loni Collins was questioned and allegedly told investigators that he had not seen the victim in over a year and didn't know where she was living. Debra Collins also allegedly told a bank representative in April that she didn't know where the victim was, after the bank froze the representative payee account.
Another witness was interviewed and said that Debra Collins claimed she moved the victim to a different group home, but would not give any further information when asked, according to the investigation.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Here's how your personal information is sold to criminals
Here's how your personal information is sold to criminals

Yahoo

time3 hours ago

  • Yahoo

Here's how your personal information is sold to criminals

Every year, massive data breaches harm the public. The targets are email service providers, retailers and government agencies that store information about people. Each breach includes sensitive personal information, such as credit and debit card numbers, home addresses and account usernames and passwords from hundreds of thousands -- and sometimes millions -- of people. When National Public Data, a company that does online background checks, was breached in 2024, criminals gained the names, addresses, dates of birth and national identification numbers, such as Social Security numbers of 170 million people in the U.S., United Kingdom and Canada. The same year, hackers who targeted Ticketmaster stole the financial information and personal data of more than 560 million customers. As a criminologist who researches cybercrime, I study the ways that hackers and cybercriminals steal and use people's personal information. Understanding the people involved helps us to better recognize the ways that hacking and data breaches are intertwined. In so-called stolen data markets, hackers sell personal information they illegally obtain to others, who then use the data to engage in fraud and theft for profit. The quantity problem Every piece of personal data captured in a data breach -- a passport number, Social Security number or login for a shopping service -- has inherent value. Offenders can use the information in different ways. They can assume someone else's identity, make a fraudulent purchase or steal services such as streaming media or music. The quantity of information, whether Social Security numbers or credit card details, that can be stolen through data breaches is more than any one group of criminals can efficiently process, validate or use in a reasonable amount of time. The same is true for the millions of email account usernames and passwords, or access to streaming services that data breaches can expose. This quantity problem has enabled the sale of information, including personal financial data, as part of the larger cybercrime online economy. The sale of data, also known as carding, references the misuse of stolen credit card numbers or identity details. These illicit data markets began in the mid-1990s through the use of credit card number generators used by hackers. They shared programs that randomly generated credit card numbers and details and then checked to see whether the fake account details matched active cards that could then be used for fraudulent transactions. As more financial services were created and banks allowed customers to access their accounts through the internet, it became easier for hackers and cybercriminals to steal personal information through data breaches and phishing. Phishing involves sending convincing emails or SMS text messages to people to trick them into giving up sensitive information such as logins and passwords, often by clicking a false link that seems legitimate. One of the first phishing schemes targeted America Online users to get their account information to use their Internet service at no charge. Selling stolen data online The large amount of information criminals were able to steal from such schemes led to more vendors offering stolen data to others through different online platforms. In the late 1990s and early 2000s, offenders used Internet Relay Chat, or IRC channels, to sell data. IRC was effectively like modern instant messaging systems, letting people communicate in real time through specialized software. Criminals used these channels to sell data and hacking services in an efficient place. In the early 2000s, vendors transitioned to web forums in which individuals advertised their services to other users. Forums quickly gained popularity and became successful businesses with vendors selling stolen credit cards, malware and related goods and services to misuse personal information and enable fraud. One of the more prominent forums from this time was ShadowCrew, which formed in 2002 and operated until being taken down by a joint law enforcement operation in 2004. Their members trafficked over 1.7 million credit cards in less than three years. Forums continue to be popular, though vendors transitioned to running their own web-based shops on the open Internet and dark web, which is an encrypted portion of the web that can be accessed only through specialized browsers like TOR, starting in the early 2010s. These shops have their own web addresses and distinct branding to attract customers, and they work in the same way as other e-commerce stores. More recently, vendors of stolen data have also begun to operate on messaging platforms such as Telegram and Signal to quickly connect with customers. Cybercriminals and customers Many of the people who supply and operate the markets appear to be cybercriminals from Eastern Europe and Russia, who steal data and then sell it to others. Markets have also been observed in Vietnam and other parts of the world, though they do not get the same visibility in the global cybersecurity landscape. The customers of stolen data markets may reside anywhere in the world, and their demands for specific data or services may drive data breaches and cybercrime to provide the supply. The goods Stolen data is usually available in individual lots, such as a person's credit or debit card and all the information associated with the account. These pieces are individually priced, with costs differing depending on the type of card, the victim's location and the amount of data available related to the affected account. Vendors frequently offer discounts and promotions to buyers to attract customers and keep them loyal. This is often done with credit or debit cards that are about to expire. Some vendors also offer distinct products such as credit reports, Social Security numbers and login details for different paid services. The price for pieces of information varies. A recent analysis found credit card data sold for $50 on average, while Walmart logins sold for $9. However, the pricing can vary widely across vendors and markets. Illicit payments Vendors typically accept payment through cryptocurrencies, such as Bitcoin, that are difficult for law enforcement to trace. Once payment is received, the vendor releases the data to the customer. Customers take on a great deal of the risk in this market because they cannot go to the police or a market regulator to complain about a fraudulent sale. Vendors may send customers dead accounts that are unable to be used or give no data at all. Such scams are common in a market where buyers can depend only on signals of vendor trust to increase the odds that the data they purchase will be delivered, and if it is, that it pays off. If the data they buy is functional, they can use it to make fraudulent purchases or financial transactions for profit. The rate of return can be exceptional. An offender who buys 100 cards for $500 can recoup costs if only 20 of those cards are active and can be used to make an average purchase of $30. The result is that data breaches are likely to continue as long as there is demand for illicit, profitable data. This article is part of a series on data privacy that explores who collects your data, what and how they collect, who sells and buys your data, what they all do with it, and what you can do about it. Thomas Holt is a professor of criminal justice at Michigan State University. This article is republished from The Conversation under a Creative Commons license. Read the original article. The views and opinions expressed in this commentary are solely those of the author.

FBI Warns iPhone And Android Users—Do Not Take These Calls
FBI Warns iPhone And Android Users—Do Not Take These Calls

Forbes

time4 hours ago

  • Forbes

FBI Warns iPhone And Android Users—Do Not Take These Calls

You have been warned — do not take the call. The FBI is warning smartphone users this week to be alert to nationwide attacks that frighten citizens into sending money. There's a nasty twist to this scam, and it's one where law enforcement is especially keen to stop Americans becoming victims. 'Scammers are spoofing FBI phone numbers nationwide,' the bureau says, 'impersonating government agents. Victims are tricked into thinking an arrest is imminent unless they send money.' If you receive such a call, the advice is simple and clear: 'The FBI will never call you demanding money to get out of criminal charges. It's a scam. Hang up and visit the FBI's to file a report.' The FBI is not alone in being spoofed in this way — this has become a powerful attack methodology and it's catching on fast. Last week I warned that multiple police forces across several states have issued the same warnings." New York State Police has told its citizens that 'an ongoing phone spoofing scam" is now "impersonating members of law enforcement or government agencies in an attempt to solicit sensitive personal information from individuals across New York State and beyond.' Those scammers 'demand personal information such as Social Security numbers and have threatened punitive action against recipients who refuse to comply.' Whether it's federal, state or local law enforcement, the advice is exactly the same. Do not take the calls. As soon as you hear the initial pitch from the scammer, hang up and file a report, either with your local police or with the FBI's national IC3 service. As with the FBI, New York State Police warns that attacks spoof legitimate phone numbers "to make it appear as if calls are coming from trusted agencies. These scams are designed to create confusion and fear, often leading victims to comply with demands or share information that can be used to commit further fraud.' You have been warned — this scam is nasty and preys on natural fears. Do not be afraid to hang up the phone. If you have any doubts, call back your local police force using a publicly available number. But all law enforcement agencies stress they never make such threats by phone or text — it's a scam every single time.

Major data broker hack impacts 364,000 individuals' data
Major data broker hack impacts 364,000 individuals' data

Fox News

time4 hours ago

  • Fox News

Major data broker hack impacts 364,000 individuals' data

Americans' personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers. I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren't serious about protecting the one thing that is central to their business model: data. Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people. LexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data. A spokesperson for LexisNexis confirmed that the hacker gained access to the company's GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur. The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver's license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker. LexisNexis isn't a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies. In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company. Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical. Keeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands: 1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web. 2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible. 3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers (such as uBlock Origin or Privacy Badger). You might switch to a more private search engine (like DuckDuckGo or Brave) that doesn't log your queries. Consider using a browser's "incognito" or private mode when you don't want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable. 4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 5. Be cautious with personal data: Think twice before sharing extra details. Don't fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups (so marketing emails don't go to your main inbox). Only download apps from official stores and check app permissions. 6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC's consumer guide, "Your Guide to Protecting Your Privacy Online," includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months. 7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. For many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure. Should companies be allowed to sell your personal information without your consent? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels: Answers to the most-asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store