DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

ID theft and bank fraud ringleader sentenced

Posted on December 23, 2009 by Dissent

Alonzo Lamar Holloway, 44, of Oakland, California, was sentenced on Monday on a four-count Indictment that charged him with bank fraud, wire fraud, aggravated identity theft, and with conspiracy to commit bank and wire fraud and identity theft.

Holloway, who is one of 16 defendants from Oakland charged in a long-running investigation conducted by the U.S. Secret Service and the U.S. Attorney’s Office, was sentenced by U.S. District Judge Robert J. Jonker to serve 11 years in Federal prison, to pay restitution of almost $700,000, and to serve five years of supervised release following his eventual discharge from prison.

Of the 16 defendants, 11 have been convicted, two are fugitives, and three are pending trial. The convicted defendants include a former Bank of America (BOA) employee from Oakland, Mocha M. Aldridge, 31, who assisted the fraud ring by selling account information and personal identifying information of BOA account holders, information that was then used to make fraudulent high-value cash withdrawals from BOA branches across the United States between 2007 and 2009, including in the Western District of Michigan.

The case, which is being investigated by the U.S. Secret Service, began on January 9, 2009, when employees of a BOA branch in Wyoming notified the Wyoming Police Department that a person had just attempted to make a large cash withdrawal under suspicious circumstances. Wyoming officers responded within minutes and arrested four suspects as they were driving away from the bank branch – Holloway; Shawncy McGowan, 26; Kamillah Brown, 33; and Kirk Usher, 51, all of whom were Oakland residents. All four have since been convicted. Members of the Metropolitan Fraud and Identity Theft Team (MFITT), working out of the Wyoming Police Department under the direction of Chief James Carmody, began the investigation, notifying the Grand Rapids office of the U.S. Secret Service within hours of the arrests when they developed evidence indicating that the activity under investigation reached well beyond Grand Rapids.

In imposing the sentence, Judge Jonker commented on Holloway’s leadership role in the fraud, the large scope and geographic reach of the activity, the significant financial loss associated with the crimes, and the need to deter others from committing identity theft and related financial crimes.

Source: U.S. Attorney’s Office, Western District of Michigan

Related posts:

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
Category: Financial SectorInsiderTheft

Post navigation

← (Update) AK: Local retailer hacked, credit card info stolen
Judge Gives Preliminary OK To Countrywide breach settlement →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.