DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Last conspirator in $5 million fraud ring sentenced

Posted on August 1, 2009 by Dissent

Dana J. Boente, U.S. Attorney for the Eastern District of Virginia, announced that all seven conspirators have now been sentenced for stealing more than $5 million through a fraud scheme involving identity theft and credit card, bank and mortgage fraud.

The scheme, led by Abdul Hameed of Houston Texas, involved the use of at least 35 false identities to obtain approximately 200 credit card accounts and to open approximately 60 bank accounts. From about May 2005 to May 2007, Hameed and others used the false identities – representing individuals or businesses – to purchase properties, make other large purchases, conduct balance transfers and obtain substantial cash advances. The conspirators were all born in Pakistan and transferred hundreds of thousands of dollars from the scheme to accounts in Pakistan.

Hameed was sentenced on July 25, 2008, to 212 months in prison as the ringleader of the fraud scheme, and today Arshad Hussain of Dumfries, Va. was sentenced to 24 months in prison after previously escaping to Pakistan and ultimately returning to the United States to face charges in this case. Other conspirators include:

  • Bilal Saleem, age 29, of Woodbridge, Va., sentenced to 78 months in prison on Dec. 14, 2007.
  • Naim Aslam Mann, age 34, of Baltimore, Md., sentenced to 45 months in prison on Dec. 14, 2007
  • Basir Chand, age 45 of Springfield, Va., sentenced to 78 months in prison on Nov. 9, 2007
  • Jawad Ahmad, age 43, of Ashburn, Va., sentenced to36 months in prison on Feb. 12, 2008
  • Ozair Idris, age 37, of Tamarac, Fl., sentenced to 30 months in prison on Feb. 29, 2008.
  • Some sentences were later reduced by the court in recognition of the defendants’ assistance in investigating and prosecuting these offenses.

    All the members of the conspiracy were ordered to pay forfeiture of $5 million and to repay more than $3 million in restitution to the victims.

    The case was prosecuted by Assistant United States Attorneys James P. Gillis, Gordon D. Kromberg, and Karen L. Taylor, and was investigated by a team of law enforcement agents from the FBI, the Fairfax County Police Department, and the U.S. Postal Inspection Service.

    Source: U.S. Attorney’s Office, Eastern District of Virginia


    Related:

    • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
    • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
    • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
    • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
    • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
    • Heritage Provider Network $49.99M Class Action Settlement
    Category: ID TheftU.S.

    Post navigation

    ← SSA employee convicted for unauthorized access to govt computer
    Suit claims Riverside County hospital breached patient's privacy →

    Now more than ever

    "Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

    Search

    Browse by Categories

    Recent Posts

    • Checkout.com Discloses Data Breach After Extortion Attempt
    • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
    • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
    • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
    • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
    • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
    • End of the game for cybercrime infrastructure: 1025 servers taken down
    • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
    • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
    • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

    No, You Can’t Buy a Post or an Interview

    This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

    And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

    Want to Get Our RSS Feed?

    Grab it here:

    https://databreaches.net/feed/

    RSS Recent Posts on PogoWasRight.org

    • OpenAI fights order to turn over millions of ChatGPT conversations
    • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
    • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
    • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
    • Data broker Kochava agrees to change business practices to settle lawsuit

    Have a News Tip?

    Email: Tips[at]DataBreaches.net

    Signal: +1 516-776-7756

    Contact Me

    Email: info[at]databreaches.net
    Security Issue: security[at]databreaches.net
    Mastodon: Infosec.Exchange/@PogoWasRight
    Signal: +1 516-776-7756
    DMCA Concern: dmca[at]databreaches.net
    © 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.