{"id":1021,"date":"2026-01-09T13:38:00","date_gmt":"2026-01-09T14:38:00","guid":{"rendered":"http:\/\/www.missioncommons.com\/?p=1021"},"modified":"2026-01-19T09:50:59","modified_gmt":"2026-01-19T09:50:59","slug":"a-major-epic-and-ikon-pass-fraud-scandal-has-been-exposed-what-does-it-mean","status":"publish","type":"post","link":"http:\/\/www.missioncommons.com\/index.php\/2026\/01\/09\/a-major-epic-and-ikon-pass-fraud-scandal-has-been-exposed-what-does-it-mean\/","title":{"rendered":"A Major Epic and Ikon Pass Fraud Scandal Has Been Exposed. What Does It Mean?"},"content":{"rendered":"

Background<\/h3>\n

In late 2020, skiers in Utah began encountering tantalizing offers online: \u201cDiscounted Ikon and Epic Passes\u201d<\/em>\u2014season passes for world-class ski resorts at prices well below face value. Behind these offers was 29-year-old Jamilla Greene from Fort Mill, South Carolina, who, along with other associates, launched these ads marketing two of the ski industry\u2019s most coveted products: Vail Resorts\u2019 Epic Pass and Alterra\u2019s Ikon Pass. These passes normally grant access to multiple world-class resorts and can cost between $600 and $1,500 USD each, so a cut-rate deal was sure to attract budget-conscious snow enthusiasts. The team capitalized on this by posting ads in ski community forums and online classifieds (from KSL Classifieds to Craigslist and Facebook Marketplace) wherever skiers and riders might look for deals. The pitch was simple: season passes or lift tickets at a \u201cdiscount\u201d, no catch\u2014except, of course, there was a very big catch.<\/p>\n

\u00a0<\/p>\n

<\/p>\n

\"\"

\n

A mockup example of what an email exchange could have looked like between the fraudsters and a potential buyer<\/p>\n<\/figcaption><\/figure>\n

\u00a0<\/p>\n

What buyers didn\u2019t know was that Greene had no authorization from resorts to sell discounted passes, and they weren\u2019t absorbing the cost difference out of generosity. Instead, the scheme\u2019s origin lay in a mix of identity theft and clever social engineering. When an interested skier or rider responded to one of the ads, Greene or her co-conspirators would move the conversation to private channels\u2014be it text messages, emails, social media DMs\u2014to build trust and gather the personal details needed to buy a pass (name, age, address, etc.). From the outside, it appeared as if Greene was facilitating a routine purchase on the customer\u2019s behalf. In reality, she was preparing to use stolen credit card information to foot the bill.<\/p>\n

Armed with the buyer\u2019s personal details, Greene would log onto the official online ticket portals for the relevant resort or pass (Ikon\u2019s or Epic\u2019s website, or a specific resort\u2019s system) and purchase the pass at full price using someone else\u2019s stolen credit card information obtained through illicit means. To the legitimate cardholders and banks, these charges looked like any other expensive ski pass purchase, and it could be weeks before they noticed and reported fraudulent activity. Meanwhile, the buyer would send payment for this \u201cdiscounted\u201d pass directly to Greene through peer-to-peer apps like Venmo, PayPal, Zelle, or Apple Pay. Notably, PayPal and Apple Pay were used in peer-to-peer mode, not merchant mode, meaning they didn\u2019t accept credit cards and there was no chargeback protection. Greene then delivered the newly bought digital pass or lift ticket to her customer, often via email or even physical mail in some cases. In essence, Greene created a middleman transaction: using a stolen credit card to give a customer a legitimate pass, then pocketing the buyer\u2019s money for herself. It seemed like a win-win for her\u2014until, as recent court filings note, the scheme began to snowball out of control.<\/p>\n

The Scheme Grows<\/h3>\n

What started quietly in late 2020 grew over the next four ski seasons into what prosecutors describe as a \u201cmulti-year, multimillion-dollar scheme.\u201d<\/em> By 2021 and 2022, more buyers began responding to online listings and referrals circulating within ski communities. Who doesn\u2019t like a good bargain after all\u2014and if you get one, are you just not going to share with your friends? Greene and her team placed targeted ads in ski towns not just in Utah but \u201celsewhere\u201d as well, meaning the scam\u2019s reach extended beyond a single state. Since the fraud persisted across multiple seasons, it was clear that the team\u2019s demand for discounted passes remained steady or increased year after year.<\/p>\n

As the client list expanded, so did the need for more stolen credit card numbers and more collaborators to handle the volume of transactions. According to federal investigators, Greene\u2019s co-conspirators shared these stolen card numbers amongst themselves, using them interchangeably to make the fraudulent purchases. At no point were the skiers and riders buying these passes aware of the fraud behind the scenes; from their perspective, they paid Greene or an associate, and they received a valid pass that showed up officially on the Epic or Ikon website, in their name. For a while, these scammed customers didn\u2019t actually notice anything wrong with their passes, and in some cases, they were even able to use them.<\/p>\n

\u00a0<\/p>\n

<\/p>\n

\"\"

\n

Many victims of the scheme were able to use the fraudulent passes to get through RFID gates and board lifts at resorts, such as the Collins lift at Alta pictured above.<\/p>\n<\/figcaption><\/figure>\n

\u00a0<\/p>\n

By early 2023, the scam was running at full tilt. It now involved \u201cvarious Utah mountain resorts\u201d<\/em> beyond just the big multi-resort passes. In addition to Ikon and Epic passes that unlocked dozens of resorts (including Utah\u2019s Alta, Snowbird, Deer Valley, Solitude, Brighton, Snowbasin and Park City), the crew also offered \u201cdiscounted\u201d single-mountain season passes and even day lift tickets for individual resorts. The financial scale of the operation climbed into the millions. Investigators would later conclude that the conspiracy resulted in \u201cmillions of dollars of loss\u201d<\/em> <\/a>borne by resorts and financial institutions once the dust settled. Extrapolated across multiple resorts and several seasons, it\u2019s clear the scheme facilitated thousands of bogus transactions.<\/p>\n

Throughout this expansion, the methods remained straightforward and surprisingly low-tech. The fraudsters didn\u2019t hack any resort systems or forge pass IDs; they simply exploited the e-commerce convenience that resorts offered. By using real personal details of the buyer with a stolen card, the purchases passed security checks; the names matched the pass users, and the charges initially went through since the card details were valid (even if they weren\u2019t legally theirs to use). After all, people buy passes for others all the time, whether it be as a gift, for others in their ski group, or acting in a travel agent capacity. The perpetrators likely assumed that any single fraudulent chargeback here or there would be written off as a one-time incident (and more on what those chargebacks meant for the scammed customers in a minute). For a while, they were right\u2014but it was only a matter of time until unusual patterns gave them away.<\/p>\n

\u00a0<\/p>\n

<\/p>\n

\"\"

\n

The fraud scheme was uncovered when the large amount of credit card chargebacks grew too large to remain unnoticed. <\/p>\n

Note: example image for illustrative purposes only<\/p>\n<\/figcaption><\/figure>\n

\u00a0<\/p>\n

How the Fraud was Exposed<\/h3>\n

The scheme did not unravel because of a single catastrophic mistake. Instead, it began to surface the way many large financial frauds do: through accounting anomalies that no longer fit within the range of normal error.<\/p>\n

During the 2022-2023 ski season, multiple Utah resorts began seeing elevated levels of credit card chargebacks tied to lift tickets and season passes. Chargebacks are not unusual in the ski industry; lost cards, family disputes, or travel cancellations all generate occasional reversals. However, the volume and consistency of these reversals began to raise internal suspicions. According to later federal summaries and independent ski-industry reporting, Big Cottonwood Canyon\u2019s Brighton ski resort emerged as one of the first mountains where the irregular pattern became impossible to ignore.<\/p>\n

By early 2023, Brighton had identified a concentrated cluster of disputed transactions<\/a> associated with lift access products that had already been issued and, in many cases, used. From the resort\u2019s perspective, this meant something more serious than buyer\u2019s remorse: banks were clawing back funds weeks after the fact because the underlying credit cards had been reported stolen. Over a relatively short period, the total value of these reversals climbed into the tens of thousands of dollars\u2014well beyond what would be expected from routine disputes. While exact figures were not disclosed by prosecutors, independent reporting found that Brighton identified over $50,000 in fraudulent pass purchases in just a four-month window.<\/a><\/p>\n

As Brighton\u2019s ticketing and finance teams reviewed the affected transactions, another anomaly stood out. A disproportionate number of the disputed purchases traced back to the same customer account within the resort\u2019s online sales system. That account\u00a0appeared to be purchasing lift access for numerous individuals, behavior that strongly diverged from normal guest usage patterns. Rather than a single visitor or family buying passes for themselves, the account functioned more like a distribution hub.<\/p>\n

\u00a0<\/p>\n

<\/p>\n

\"\"

\n

Brighton was the first resort to notice anything wrong with tickets and passes being used on its slopes.<\/p>\n

Note: example image used for illustrative purposes only<\/p>\n<\/figcaption><\/figure>\n

\u00a0<\/p>\n

Further review revealed that at least some of the passes linked to that account were actively being used on the mountain. Resort staff flagged the situation internally and escalated it to law enforcement, suspecting the activity was part of a broader fraud operation rather than isolated misuse. At that point, the issue moved beyond resort loss prevention and into criminal investigation territory.<\/p>\n

When authorities began speaking with skiers and riders whose access had been tied to the flagged transactions, a clearer picture emerged. These individuals reported that they had purchased what they believed were legitimate, discounted multi-resort passes through informal channels,<\/a> often via personal referrals or online listings rather than official resort platforms. In several cases, the passes initially worked without issue, reinforcing the perception that the transactions were legitimate.<\/p>\n

However, that illusion collapsed once the underlying credit card fraud was discovered. After cardholders disputed the unauthorized charges, resorts and pass operators voided the associated passes. Buyers found their access abruptly revoked, sometimes mid-season, after receiving notices that the payment method used for their pass had been invalidated. As a result, they were left with no pass at all and hundreds, if not thousands, in squandered value.<\/p>\n

By the time law enforcement formally intervened, Brighton\u2019s findings had become a critical entry point into a much larger investigation. Resort transaction data, combined with payment records from peer-to-peer apps and online communications with buyers, allowed investigators to trace the activity outward. What may have initially appeared to be a localized anomaly was soon connected to similar fraudulent purchases across multiple resorts, most notably those in Utah and Colorado, as well as national pass platforms, all following the same basic structure: stolen credit cards upstream, discounted resale downstream, and digital peer-to-peer payment apps with no fraud protections acting as the bridge.<\/p>\n

Federal agencies, including the U.S. Postal Inspection Service because of the physically mailed passes, became involved as the investigation expanded. And by mid-2025, authorities had assembled a comprehensive view of the operation\u2019s scope, revealing a coordinated, multi-year fraud network rather than a one-off resale scam. Crucially, by tracing the money flows on the peer-to-peer payment apps and the communication logs with buyers, law enforcement honed in on Jamilla Greene and others in her circle, culminating in her arrest in late 2025.<\/p>\n

\u00a0<\/p>\n

<\/p>\n

\"\"

\n

The top of the Crest 6 chairlift at Brighton<\/p>\n<\/figcaption><\/figure>\n

\u00a0<\/p>\n

Impact on Resorts and Skiers<\/h3>\n

When the scheme finally unraveled, it became clear that a lot of people got burned. Federal investigators noted that each fraudulent transaction in this scam effectively created up to \u201cfour separate intended victims.\u201d<\/em><\/a> Let\u2019s break that down:<\/p>\n