DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

(follow-up) Three black market travel agents plead guilty

Posted on September 28, 2010 by Dissent

Beth Phillips, United States Attorney for the Western District of Missouri, announced today that three defendants have pleaded guilty to their roles in a conspiracy among black market travel agents who used the stolen identities of thousands of victims as part of a multi-million dollar fraud scheme to purchase airline tickets for their customers. Some of the victims were hotel guests in Atlanta.

Sean Fleming, also known as”David Bravo” or “Pucci,” 29, of Hialeah, Fla., and Kareem Nelson, 31, of Atlanta, Ga., pleaded guilty to their roles in the conspiracy in separate appearances today before U.S. Chief District Judge Fernando J. Gaitan. Alexander Lewis, also known as “Mike Gotti,” 25, of McDonough, Ga., pleaded guilty on Tuesday, Sept. 21, 2010, to the same conspiracy charge contained in a May 5, 2010, federal indictment.

Fleming participated in the conspiracy as a black market travel agent who booked hundreds of fraudulent airline reservations and compromised more than 1,000 credit/debit cards, causing more than $1 million in losses to his victims. Fleming admitted that he used stolen credit/debit card information to purchase airline reservations for his customers.

Fleming purchased the stolen credit/debit card information of the identity theft victims at a nominal cost, then used the stolen credit/debit card information to purchase the airline tickets. Fleming then sold the airline reservations to his customers and charged far less than the value of legitimately purchased reservations. Fleming generally purchased reservations close to the time of departure so that the airlines, credit card companies, or identity theft victims would be less likely to detect the fraudulent purchases and have the tickets canceled. As a result, the passengers could often complete their trips before the fraud was detected.

Fleming obtained stolen credit/debit card information from a variety of sources, including co-defendants and a source in Dhaka, Bangladesh. To conceal his communication with those sources, Fleming used the identity of an individual named David Bravo, without Bravo’s consent, and used public wireless Internet sources.

Fleming used stolen credit/debit card numbers for cardholders from dozens of states, including Missouri, Kansas, Alabama, Arizona, California, Connecticut, Florida, Georgia, Illinois, Indiana, Iowa, Massachusetts, Michigan, New Jersey, New York, North Carolina, Tennessee, Washington, West Virginia, and Wisconsin. Fleming used a credit card verification service to determine whether the stolen credit/debit card information was valid and could be used to purchase airline tickets. Fleming obtained a merchant identification number assigned to a company in White Plains, N.Y., in order to access the credit card verification service.

Nelson’s primary role in the conspiracy was to obtain fraudulently purchased airline tickets for both himself and his customers from Fleming and others, whom Nelson knew had used stolen credit/debit card information. Nelson also used the stolen credit/debit card information himself to purchase airline reservations. Nelson admitted that he flew or arranged more than 15 flights.

Lewis worked at two hotels in the Atlanta area, and abused his position at the hotels to obtain credit/debit card information for Fleming and others. Lewis admitted that he stole 20 to 25 sets of credit/debit cards from one hotel, and one set of credit/debit cards from the other hotel. Lewis sold those cards to Fleming and others, knowing that they would be used to make purchases online without the authorization of the cardholders.

Under federal statutes, Fleming, Nelson and Lewis are each subject to a sentence of up to five years in federal prison without parole, plus a fine up to $250,000. Sentencing hearings will be scheduled after the completion of presentence investigations by the United States Probation Office.

These cases are being prosecuted by Assistant U.S. Attorneys John E. Cowles and Matt Hiller. They were investigated by the U.S. Postal Inspection Service, the Overland Park, Kan., Police Department, and the Kansas City Secret Service Task Force, and with the assistance of the Drug Enforcement Administration.

Source: U.S. Attorney’s Office, Western Missouri


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Breach IncidentsBusiness SectorID TheftInsiderTheftU.S.

Post navigation

← Texas state health agency sells — or gives away — patient data
Two Sentenced for Accessing President’s Student Loan Records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.