Bridgewater woman embezzled money from several employers, avoided taxes

Deborah Wilmot, from Bridgewater, Connecticut, was originally set to be sentenced on for charges of tax evasion of money embezzled from a former employer, Amkai Solutions, on May 29. However, her sentencing has been rescheduled for July 31.

The charges against Wilmot are not the first she has faced for embezzlement. According to The Register Citizen, an accounts payable audit was conducted by one of her former employers, Bull Bridge Golf Club, where she served as a bookkeeper. The audit found that Wilmot had allegedly stolen over $21,000 from the organization. She stole funds from a petty cash account, kept cash payments for personal use and took over $2,750 from the club's vending machines, states the news source.

Wilmot was first convicted of forgery, insurance fraud and first-degree grand larceny in 2004 by the Canterbury School, where she worked as an assistant controller from October 2001 to May 2003, reports the Citizen. She stole more than $100,000 from the private school by redirecting tuition payments and cashing out three students' insurance policies. Wilmot was sentenced to three years in prison with five years probation.

From 2008 to 2009, Wilmot began to work for Amkai Solutions as a bookkeeper, and is charged with violating the terms of her probation, states The Greater New Milford Spectrum. She pleaded guilty to the charges of not reporting more than $220,000 of embezzled monies as income to the government, says the newspaper.

During her time as bookkeeper, she convinced Amkai Solutions to open a new bank account to deal with international business. She then cashed checks and withdrew money from the account to make personal purchases, says the Spectrum.

Wilmot faces up to five years in prison and she must also make restitution for back taxes plus interest to the IRS, the news source states.

Leave a Reply

Your email address will not be published. Required fields are marked *

Prove You're Human * Time limit is exhausted. Please reload the CAPTCHA.