United States v. Regina Tolliver

451 F. App'x 97
CourtCourt of Appeals for the Third Circuit
DecidedSeptember 15, 2011
Docket10-3439
StatusUnpublished
Cited by3 cases

This text of 451 F. App'x 97 (United States v. Regina Tolliver) is published on Counsel Stack Legal Research, covering Court of Appeals for the Third Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Regina Tolliver, 451 F. App'x 97 (3d Cir. 2011).

Opinion

OPINION OF THE COURT

SCIRICA, Circuit Judge.

Regina Tolliver was convicted by a jury of bank fraud, aggravated identity theft, and unauthorized access of a computer, in violation of 18 U.S.C. §§ 1344, 1028A, and 1030, respectively. She was sentenced to 30 months’ imprisonment and a five-year term of supervised release. Tolliver was ordered to pay restitution of $181,577 and a special assessment of $900. We will affirm.

I.

A.

Between March and November 2007 two different “check runners” cashed fraudulent checks against the accounts of seven Citizens Bank customers in branches in *99 upstate New York, western Pennsylvania, and Delaware. 1 The checks were drawn on banks other than Citizens Bank and were rejected as fraudulent. Initially the Citizens Bank customers were charged the checks’ face value. However, once it was determined the customers were the victims of fraud, Citizens Bank credited their accounts and absorbed the total loss of $181,577.

At the time of the fraud, Citizens Bank used computer systems to manage and track its customer accounts. The systems contained customers’ personal information, including names, addresses, dates of birth, Social Security numbers, driver’s license numbers, and Citizens Bank account numbers and balances. Bank employees could access this information in either the mainframe or touch point computer systems by entering their employee number and password. 2

Testimony at trial revealed that Citizens Bank employees are assigned a nonconfi-dential employee number and then choose their passwords. Employees are instructed to keep their passwords secure, confidential, and not to write them down. Employees are not allowed to share their passwords with anyone else, including each other. If someone believes that another person has learned of his password, he is required to inform management and change the password. If an employee must leave a computer terminal where he is working, the employee is required to temporarily lock the terminal or sign off completely. Employees use their passwords between ten and fifteen times a day and are required to change them every two to three months.

When an employee accesses either the mainframe or touch point systems, data concerning the activity is archived in an employee tracking system for approximately six months. This system is known as the “employee footprint” and can be recalled to determine the employee number entered to access certain accounts. Citizens Bank senior fraud investigator Todd Swoyer ran a footprint report for each of the compromised accounts. He discovered that Tolliver’s employee number was the only one that was associated with each of the accounts. In addition, his investigation showed that, with one exception, after Tolliver’s number and password were entered to look up account information, someone called the Citizens Bank automated system to check the accounts. These calls were made either the day after the accounts were accessed or a few days to weeks before the fraudulent checks were cashed against them. All five of the victims who testified said they did not make these calls.

Swoyer’s investigation revealed that the seven customers’ accounts were accessed under Tolliver’s employee number on February 5 and 8, 2007, and on March 7, 8, and 9, 2007. The Citizens Bank information technology service determined that on February 5 accounts from the first three victims were compromised from the King *100 of Prussia Mall branch where Tolliver was employed. 3 Attendance records confirmed that only Tolliver and branch assistant manager Angela Anderson worked on all of these days. Anderson testified she never knew Tolliver’s password and never signed into a computer terminal someone else was already using.

During the time of the investigation, Citizens Bank employees who contacted a customer during the business day were required to record it in their logbook. Tolliver’s logbook did not show that she contacted any of the seven victims for business purposes on the dates their accounts were accessed. Tolliver was also not assigned to contact any of these individuals for sales purposes on those dates. Citizens Bank employees were not permitted to look at a customer’s account and personal information without a business purpose.

Swoyer, United States Postal Inspector Frank Busch, and a Secret Service agent interviewed Tolliver on March 15, 2007. Swoyer testified that he reviewed Tolliver’s entire logbook with her during her interview. Her book included a page that had passwords written on it. Swoyer testified that the passwords were for HR Express, a system unrelated to the mainframe or touch point systems. Further, he stated that Tolliver told him that she had not given her password to anyone and that she always logged off her computer when she walked away from a terminal. All seven of Tolliver’s former co-workers who testified said they never knew her password or saw it written down. Tolliver was terminated immediately following her interview.

On January 17, 2008, Tolliver was indicted on one count of bank fraud, and aiding and abetting bank fraud, in violation of 18 U.S.C. § 1344; seven counts of aggravated identity theft, and aiding and abetting aggravated identity theft, in violation of 18 U.S.C. § 1028A; and one count of access of a computer in excess of authorization to obtain a financial record, in violation of 18 U.S.C. § 1030. She was the only defendant charged in the indictment.

B.

At trial, the Government called United States Postal Inspector Frank Busch to testify as an expert on the operation of bank fraud schemes. Busch had over fourteen years of experience investigating financial crimes with the United States Postal Inspection Service. He received extensive training in criminal financial investigations from multiple agencies, including the United States Attorney’s Office and the International Association of Financial Crimes Investigators. He estimated that he had completed 1000 fraud and identity theft investigations and acted mainly as lead investigator in such matters. He stated he investigated hundreds of bank fraud and identity theft cases in Philadelphia, including twenty involving bank employees. Defense counsel did not object to Busch testifying as an expert witness.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
451 F. App'x 97, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-regina-tolliver-ca3-2011.