DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WA: Leader of ID Theft Ring Sentenced to 6 Years

Posted on June 26, 2010 by Dissent

Jeania Andrea Dyson, 36, was sentenced this week in U.S. District Court in Seattle to six years in prison and five years of supervised release for Bank Fraud, Social Security Number Misuse, and Aggravated Identity theft. Dyson was the leader of an identity theft ring that would use stolen identities to open “instant credit” accounts at various retailers. According to a press release issued by the U.S. Attorney’s Office in Washington, at sentencing Chief U.S. District Judge Robert S. Lasnik noted that Dyson victimized a large number of people, had four previous criminal convictions, and “continues to return to a life of crime.”

Dyson was the leader of an extensive identity theft ring that hit retailers around the Puget Sound region. Dyson provided identities to co-conspirators Gordon Robert Burrage, Stephanie Leaann Locke, Valorie Almeta Dade, and Dade’s daughter, Lakaia Cherie Dade.

Using the false identities, the co-conspirators would open “instant credit accounts” at large retailers. If the account was successfully opened, the conspirators would quickly go to other outlets of the retailer and purchase thousands of dollars of goods from a shopping list provided by Dyson, who would then sell the goods on the black market or provide them as payment to other members of the scheme. Some 42 victims had their identities stolen and used in this way, racking up more than $130,000 in charges. Most victims did not know they had been victimized until the instant credit charges started rolling in weeks later.

Dyson is the last of the ring to be sentenced. Valorie Dade was sentenced to 51 months in prison, Lakaia Dade was sentenced to 36 months in prison, Gordon Burrage was sentenced to 30 months in prison and Stephanie Locke was sentenced to 18 months in prison.

The ring got caught in May 2009 when they attempted to use a false identity at the cash register of the person whose identity information they had stolen.

Unfortunately, statements by the U.S. Attorney’s Office do not indicate how the ring stole or obtained the identity information.


Related:

  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • Two more entities have folded after ransomware attacks
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Missouri Adopts New Data Breach Notice Law
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
Category: ID TheftU.S.

Post navigation

← Former Bank of America teller sentenced for fraud
Another printing error exposes SSN →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.