DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

International ID theft scheme defendant sentenced to 13 1/2 years

Posted on September 11, 2009 by Dissent

Koleowo Adeyemi Adesoye, 28, of Houston, was sentenced to 13 ½ years in federal prison without parole for his involvement in planning and executing an international identity theft scheme causing $2 million in losses to financial institutions, United States Attorney Tim Johnson announced today.

United States District Judge Ewing Werlein Jr. handed down the prison term which includes 138 months for the each of five bank fraud convictions to be served concurrently and a mandatory consecutive 24 months for the aggravated identity theft conviction at a hearing this morning. The prison term is to followed by a five-year-term of supervised release. The court also ordered Adesoye pay a total of $968,974 in restitution to affected financial institutions.

During the fall of 2008, Adesoye, a Nigerian national and naturalized citizen of the United States, was involved in a scheme to defraud account holders at various financial institutions involving the transfer of funds out of the accounts of legitimate account holders to accounts controlled by Adesoye and others. Adesoye’s accounts were located at financial institutions across the United States and overseas including South Korea In October 2008. United States Postal Inspection Service (USPIS) Inspectors were tipped off to the fraud scheme by one of victim financial institutions and initiated an investigation.

On Oct. 22, 2008, USPIS inspectors executed a search warrant on Adesoye’s residence and found the personal identification information for thousands of victims located on electronic storage devices including flash drives as well as a cellular telephones used to access the customer accounts. In addition, inspectors found equipment to manufacture credit cards including a skimmer and a large amount of stolen mail and correspondence from financial institutions. USPIS Inspectors also located wire transfer authorization forms that corresponded with the five wire transfers charged as substantive bank fraud counts in the Indictment. The intended loss for the scheme was more than $10 million with an actual loss to financial institutions of approximately $2 million.

The sentence imposed included consideration of the court’s finding that Adesoye engaged in a massive fraud scheme that involved thousands of victims and more than a $10 million risk of loss to financial institutions and the items found in his possession — flash drives filled with identification information, numerous cell phones, items to create false documents, credit card re-encoding equipment, credit cards, credit reports and stolen mail.

Adesoye was arrested on Oct. 22, 2008, following the search of his residence and has remained in federal custody without bond since his arrest. He pleaded guilty to the five substantive counts of bank fraud and aggravated identity theft on April 16, 2009.

This case was investigated by the USPIS and prosecuted by Assistant U.S. Attorney Ryan D. McConnell.

Source: U.S. Attorney’s Office


Related:

  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India's top exchange
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Brazil’s central bank service provider hacked, $140M stolen
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
Category: Financial SectorID TheftPaperSkimmersTheft

Post navigation

← Alico leak points to provider staff
Former loan officer indicted for fraud and ID theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Justice Department Announces Coordinated Disruption Actions Against BlackSuit (Royal) Ransomware Operations
  • NL: Hackers breach cancer screening data of almost 500,000 women
  • Violent Crypto Crimes Surge in 2025 Amid Massive Data Leaks
  • Why Ransomware Attacks Are Decreasing in 2025
  • KR: Yes24, the largest Internet bookstore in Korea, suffered its second ransomware attack in two months
  • Korea wins world’s top hacking contest for 4th consecutive year
  • 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)
  • Bank of America Refused To Reimburse Georgia Customer After Hackers Hit Account. Then a News Station Showed Up.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Navigating Privacy Gaps and New Legal Requirements for Companies Processing Genetic Data
  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.