DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

International ID theft scheme defendant sentenced to 13 1/2 years

Posted on September 11, 2009 by Dissent

Koleowo Adeyemi Adesoye, 28, of Houston, was sentenced to 13 ½ years in federal prison without parole for his involvement in planning and executing an international identity theft scheme causing $2 million in losses to financial institutions, United States Attorney Tim Johnson announced today.

United States District Judge Ewing Werlein Jr. handed down the prison term which includes 138 months for the each of five bank fraud convictions to be served concurrently and a mandatory consecutive 24 months for the aggravated identity theft conviction at a hearing this morning. The prison term is to followed by a five-year-term of supervised release. The court also ordered Adesoye pay a total of $968,974 in restitution to affected financial institutions.

During the fall of 2008, Adesoye, a Nigerian national and naturalized citizen of the United States, was involved in a scheme to defraud account holders at various financial institutions involving the transfer of funds out of the accounts of legitimate account holders to accounts controlled by Adesoye and others. Adesoye’s accounts were located at financial institutions across the United States and overseas including South Korea In October 2008. United States Postal Inspection Service (USPIS) Inspectors were tipped off to the fraud scheme by one of victim financial institutions and initiated an investigation.

On Oct. 22, 2008, USPIS inspectors executed a search warrant on Adesoye’s residence and found the personal identification information for thousands of victims located on electronic storage devices including flash drives as well as a cellular telephones used to access the customer accounts. In addition, inspectors found equipment to manufacture credit cards including a skimmer and a large amount of stolen mail and correspondence from financial institutions. USPIS Inspectors also located wire transfer authorization forms that corresponded with the five wire transfers charged as substantive bank fraud counts in the Indictment. The intended loss for the scheme was more than $10 million with an actual loss to financial institutions of approximately $2 million.

The sentence imposed included consideration of the court’s finding that Adesoye engaged in a massive fraud scheme that involved thousands of victims and more than a $10 million risk of loss to financial institutions and the items found in his possession — flash drives filled with identification information, numerous cell phones, items to create false documents, credit card re-encoding equipment, credit cards, credit reports and stolen mail.

Adesoye was arrested on Oct. 22, 2008, following the search of his residence and has remained in federal custody without bond since his arrest. He pleaded guilty to the five substantive counts of bank fraud and aggravated identity theft on April 16, 2009.

This case was investigated by the USPIS and prosecuted by Assistant U.S. Attorney Ryan D. McConnell.

Source: U.S. Attorney’s Office


Related:

  • On Reports of an Alleged Data Breach Involving G-Xchange, Inc. (GCash)
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • They were victims of a massive data breach in 2009. Interior Health denied it for a decade.
  • Flagstar Agrees to $31.5 Million Deal in Accellion-Breach Suit
  • The Identity Theft Resource Center Remains Open to Victims Amid Government Shutdown
  • Lotte Card reissues 650,000 cards after data leak, protects 1.28 million customers
Category: Financial SectorID TheftPaperSkimmersTheft

Post navigation

← Alico leak points to provider staff
Former loan officer indicted for fraud and ID theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.