DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Two charged in superseding indictment for their roles in a $30 million bank fraud and ID theft ring

Posted on October 11, 2009 by Dissent

A Miami Beach, Fla., man and his driver were charged Thursday in a Superseding Indictment for their roles in a telemarketing fraud and identity theft scheme that attempted to defraud financial institutions and their account holders throughout the United States of millions of dollars through the unauthorized and fraudulent debit of customer bank accounts.

Acting U.S. Attorney Ralph J. Marra, Jr. of the U.S. Attorney’s Office for the District of New Jersey announced that Robert Sacks, 49, and his driver, Diego Hernandez, 31, a Venezuelan citizen residing in Miami, who both were arrested on Dec. 10, 2008, along with seven additional defendants, will be arraigned on a 42-count Superseding Indictment before U.S. District Judge Garrett E. Brown, Jr., on Oct. 13 and Oct. 8, respectively. A trial for the two defendants is schedule to begin on Nov. 10, 2009.

Sacks and Hernandez are the final two remaining defendants out of 17 charged in connection with an international bank fraud ring busted for attempting to debit well over 100,000 customer accounts for more
than $30 million. The other 15 co-conspirators from Canada, New Jersey, Florida, Colorado and Michigan have already pleaded guilty for their participation in the conspiracy.

The Superseding Indictment, which was returned by a federal grand jury, describes a scheme in which the two defendants and other co-conspirators pretended to operate a telemarketing business, but instead simply withdrew or attempted to withdraw funds from over 100,000 bank accounts throughout the United States without the authorization or knowledge of account holders. Thousands of these victims, many of whom are elderly and infirm, reside in New Jersey.

According to the Superseding Indictment, Postal Inspectors began conducting an investigation into an elaborate trans-border fraud scheme in which the co-conspirators allegedly obtained lists of individuals’ names and bank account information. Then, under the pretense that these individuals had purchased items through a telemarketing business, drew money out of the victims’ bank accounts, or attempted to do so. According to the Indictment, Siamak Saleki, 43, and Jan Ludvik, 25, a.k.a. “Thomas Palmer,” both of Montreal, were responsible for collecting and providing the names and personal banking account information
of unsuspecting consumers to their co-conspirators in the United States. Allegedly, the defendants then charged the accounts of these unwitting victims using false and fraudulent demand drafts (checks not actually written by the customers, but instead generated by the coconspirators), or Account Clearinghouse (“ACH”) debits (electronic withdrawals).

The majority of these fraudulent transactions subsequently were reversed through the banking system because they were drawn upon accounts that were nonexistent, closed, contained insufficient funds, or because customers alerted their bank in time to reverse the transaction. A smaller yet still significant percentage of the debits and withdrawals were not returned to the bank because the victim did not alert the bank in time to reverse the transaction.

An original 24-count Indictment, which was returned on Sept. 10, 2008, and unsealed with the arrests made on Dec. 10, 2008, charged a total of nine defendants, including Sacks and Hernandez. Eight other co-conspirators were charged in separately filed criminal Informations. That Indictment charged both Sacks and Hernandez with one count each of conspiracy to commit mail and wire fraud and conspiracy to commit bank fraud. In addition, Sack was charged with eight counts of wire fraud, four counts of mail fraud and eight counts of aggravated identify theft.

The Superseding Indictment charges Sacks with conspiracy to commit mail and wire fraud and conspiracy to commit bank fraud as well as 18 counts of substantive wire fraud, four counts of mail fraud and 18 counts of aggravated identity theft. The Superseding Indictment continues to charge Hernandez with one count each of aggravated identify theft and wire fraud, in addition to the aforementioned conspiracy counts. In addition, the Superseding Indictment contains a forfeiture allegation that was part of the original Indictment, which seeks the forfeiture of cash, bank account assets and property in a sum equal to $7 million, which represents the total amount of proceeds illegally gained through the defendants’ scheme.

The count of conspiracy to commit mail and wire fraud carries a maximum statutory penalty of 20 years in prison and a fine of $1 million or twice the aggregate loss to the victims or gain to the defendants. The count of conspiracy to commit bank fraud carries a maximum statutory penalty of 30 years in prison and a fine of $1 million or twice the aggregate loss to the victims or gain to the defendants. Each count of mail and wire fraud carries a maximum statutory penalty of 20 years in prison and a fine of $1 million or twice the aggregate loss to the victims or gain to the defendants. Each count of aggravated identity theft carries a statutorily mandated penalty of 2 years in prison, plus a fine of $250,000.

Related posts:

  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
Category: Breach IncidentsFinancial SectorID TheftNon-U.S.Of NoteOtherU.S.

Post navigation

← Police look into shredder bin theft
Microsoft loses Sidekick users’ personal data →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.