DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Retail sales associates sentenced for role in credit card, bank fraud

Posted on October 16, 2009 by Dissent

Four men from Atlanta Georgia were sentenced this week by United States District Judge Orinda D. Evans on charges of bank fraud, credit card fraud and aggravated identity theft.

“In this case two sales associates who worked for retail establishments assisted others in committing credit card fraud,” said Acting United States Attorney Sally Quillian Yates. Carlton J. Maxey, 40, a sales associate at the Louis Vuitton store in Lenox Mall, and Lee Sterling Brockwell, 32, a sales associate at the Gucci store in Phipps Plaza, each allowed Aghedo Pius Iyamu, 43, James O. Omotosho, 39, and others to purchase more than $100,000 in merchandise when each knew that Omotosho, Iyamu, and the others were using fraudulent credit cards to do so.

Maxey was sentenced to 2 years in prison to be followed by 5 years of supervised release, and ordered to pay $199,293 in restitution. Brockwell was sentenced to 4 months in a halfway house to be followed by 4 months of house arrest, to be then followed by 3 years of supervised release, and ordered to pay $116,589 in restitution. Omotosho was sentenced to 10 years in prison to be followed by 5 years of supervised release, and ordered to pay $288,318 in restitution. Omotosho was illegally present in the United States when he committed the offenses. He was ordered deported to Nigeria after he serves his prison sentence. Iyamu was sentenced to 5 years, 10 months in prison to be followed by 5 years of supervised release, and ordered to pay $173,549 in restitution. He was also illegally present in the United States when he committed the offenses and was also ordered deported to Nigeria after he serves his prison sentence.

According to Acting United States Attorney Yates, the evidence presented at trial and other information presented in court: Omotosho and Iyamu, acting independently of each other, obtained pre-approved credit card applications that had been stolen from the mail. They also obtained the legitimate dates of birth and social security numbers of the persons to whom the stolen credit card applications were sent. They then submitted the pre-approved credit card applications with identity theft victims’ names and legitimate dates of birth and social security numbers, but with mailing addresses changed to addresses they controlled, to American Express, Chase Bank, Bank of America, Capitol One and other credit card companies. The credit card companies would then issue credit cards based on the fraudulent applications and mail them to the addresses that they had put on the applications.

In another instance, Iyamu obtained a legitimately issued American Express credit card that was stolen from the mail and through fraudulent means activated the account.

Brockwell was a sales associate at the Gucci store in Phipps Plaza and was personally acquainted with both Omotosho and Iyamu, and knew their true identities. Brockwell waited on them on numerous occasions when they purchased thousands of dollars worth of merchandise using credit cards in names other than their own.

Maxey was a sales associate at the Louis Vuitton store in Lenox Mall and was also personally acquainted with Iyamu and knew his true identity. Maxey waited on Iyamu on numerous occasions when he purchased thousands of dollars worth of merchandise using credit cards in names other than his own. On one occasion, Maxey sold Iyamu a $20,000 watch that the latter purchased with a stolen American Express credit card that was issued to a third party.

Omotosho, Iyamu, and Maxey also committed bank fraud. Omotosho, using an alias, opened bank accounts in fictitious business names. Iyamu obtained the bank account number, ATM card and PIN of an account opened by Maxey. Omotosho and Iyamu obtained counterfeit checks purportedly drawn on lines of credit accounts of customers with Bremer Bank in Minnesota. They deposited those checks into the accounts they were using to commit fraud. They also made deposits into these accounts of stolen “convenience” checks issued by credit card companies to legitimate customers. They also deposited “convenience” checks which were issued on the fraudulent credit card accounts. Omotosho, Iyamu and others would then withdraw the funds from the accounts before the fraudulent nature of the deposit items was discovered by the victim financial institutions.

Omotosho attempted to commit more than $900,000 in fraud through various bank fraud and credit card fraud schemes. Iyamu and Maxey attempted to commit more than $300,000 in fraud through various bank fraud and credit card fraud schemes. Brockwell committed more than $100,000 in credit card fraud.

This case was investigated by Inspectors with the United States Postal Inspection Service. Assistant United States Attorney William L. McKinnon, Jr. prosecuted the case.


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • On Reports of an Alleged Data Breach Involving G-Xchange, Inc. (GCash)
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
Category: Breach IncidentsFinancial SectorID TheftTheftU.S.

Post navigation

← Computer Hacker Fugitive Extradited for Cybercrimes Relating to VOIP Telephone Services
NC: State delves into employee info →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.