Maryland woman pleads guilty to using IDs from U.S. government hack

June 19, 2018 06:27
1 minute read.
Breaking news

Breaking news. (photo credit: JPOST STAFF)


Dear Reader,
As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analyses from the frontlines of Israel, the Middle East and the Jewish World.

As one of our loyal readers, we ask you to be our partner.

For $5 a month you will receive access to the following:

  • A user experience almost completely free of ads
  • Access to our Premium Section
  • Content from the award-winning Jerusalem Report and our monthly magazine to learn Hebrew - Ivrit
  • A brand new ePaper featuring the daily newspaper as it appears in print in Israel

Help us grow and continue telling Israel’s story to the world.

Thank you,

Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief


WASHINGTON - A Maryland woman pleaded guilty on Monday to participating in a scheme to use identification data stolen in a massive 2015 data hack of a US government agency to get fraudulent personal and vehicle loans through a Virginia-based credit union, the Justice Department said.

Karvia Cross, 39, and others she recruited used the identities to get loans from Langley Federal Credit Union, according to a Justice Department statement. She pleaded guilty to conspiracy to commit bank fraud and aggravated identity theft and faces a maximum of 30 years in prison when she is sentenced on Oct. 26 in the US District Court for the Eastern District of Virginia, it said.A co-defendant, Marlon McKnight, pleaded guilty to the same charges on June 11.

The charges and guilty plea are among the first to result from the hack of sensitive personal information from the Office of Personnel Management on more than 22 million federal employees, contractors and job applicants disclosed in May 2015.

The data breach, a major embarrassment for the administration of President Barack Obama, resulted in the resignation of OPM's leader and a change in how security clearance checks are conducted.

Justice Department officials did not immediately respond to enquiries about how Cross and McKnight acquired the data.

A congressional investigation in 2016 found that the hack could easily have been prevented through the use of rudimentary cyber security measures.

That probe faulted OPM - which manages employment matters for the federal government including background checks for most agencies - for not moving more quickly to address early signs of an attack, allowing hackers to later siphon off reams of data.

US intelligence officials have linked the Chinese government to the OPM breach, an accusation Beijing has denied.

Join Jerusalem Post Premium Plus now for just $5 and upgrade your experience with an ads-free website and exclusive content. Click here>>

Related Content

Breaking news
January 20, 2019
Report: Turkish U.S. consulate worker faces charges over Gulen links