DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

(follow-up) Three black market travel agents plead guilty

Posted on September 28, 2010 by Dissent

Beth Phillips, United States Attorney for the Western District of Missouri, announced today that three defendants have pleaded guilty to their roles in a conspiracy among black market travel agents who used the stolen identities of thousands of victims as part of a multi-million dollar fraud scheme to purchase airline tickets for their customers. Some of the victims were hotel guests in Atlanta.

Sean Fleming, also known as”David Bravo” or “Pucci,” 29, of Hialeah, Fla., and Kareem Nelson, 31, of Atlanta, Ga., pleaded guilty to their roles in the conspiracy in separate appearances today before U.S. Chief District Judge Fernando J. Gaitan. Alexander Lewis, also known as “Mike Gotti,” 25, of McDonough, Ga., pleaded guilty on Tuesday, Sept. 21, 2010, to the same conspiracy charge contained in a May 5, 2010, federal indictment.

Fleming participated in the conspiracy as a black market travel agent who booked hundreds of fraudulent airline reservations and compromised more than 1,000 credit/debit cards, causing more than $1 million in losses to his victims. Fleming admitted that he used stolen credit/debit card information to purchase airline reservations for his customers.

Fleming purchased the stolen credit/debit card information of the identity theft victims at a nominal cost, then used the stolen credit/debit card information to purchase the airline tickets. Fleming then sold the airline reservations to his customers and charged far less than the value of legitimately purchased reservations. Fleming generally purchased reservations close to the time of departure so that the airlines, credit card companies, or identity theft victims would be less likely to detect the fraudulent purchases and have the tickets canceled. As a result, the passengers could often complete their trips before the fraud was detected.

Fleming obtained stolen credit/debit card information from a variety of sources, including co-defendants and a source in Dhaka, Bangladesh. To conceal his communication with those sources, Fleming used the identity of an individual named David Bravo, without Bravo’s consent, and used public wireless Internet sources.

Fleming used stolen credit/debit card numbers for cardholders from dozens of states, including Missouri, Kansas, Alabama, Arizona, California, Connecticut, Florida, Georgia, Illinois, Indiana, Iowa, Massachusetts, Michigan, New Jersey, New York, North Carolina, Tennessee, Washington, West Virginia, and Wisconsin. Fleming used a credit card verification service to determine whether the stolen credit/debit card information was valid and could be used to purchase airline tickets. Fleming obtained a merchant identification number assigned to a company in White Plains, N.Y., in order to access the credit card verification service.

Nelson’s primary role in the conspiracy was to obtain fraudulently purchased airline tickets for both himself and his customers from Fleming and others, whom Nelson knew had used stolen credit/debit card information. Nelson also used the stolen credit/debit card information himself to purchase airline reservations. Nelson admitted that he flew or arranged more than 15 flights.

Lewis worked at two hotels in the Atlanta area, and abused his position at the hotels to obtain credit/debit card information for Fleming and others. Lewis admitted that he stole 20 to 25 sets of credit/debit cards from one hotel, and one set of credit/debit cards from the other hotel. Lewis sold those cards to Fleming and others, knowing that they would be used to make purchases online without the authorization of the cardholders.

Under federal statutes, Fleming, Nelson and Lewis are each subject to a sentence of up to five years in federal prison without parole, plus a fine up to $250,000. Sentencing hearings will be scheduled after the completion of presentence investigations by the United States Probation Office.

These cases are being prosecuted by Assistant U.S. Attorneys John E. Cowles and Matt Hiller. They were investigated by the U.S. Postal Inspection Service, the Overland Park, Kan., Police Department, and the Kansas City Secret Service Task Force, and with the assistance of the Drug Enforcement Administration.

Source: U.S. Attorney’s Office, Western Missouri

Category: Breach IncidentsBusiness SectorID TheftInsiderTheftU.S.

Post navigation

← Texas state health agency sells — or gives away — patient data
Two Sentenced for Accessing President’s Student Loan Records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Why Dumping Sensitive Data on Network Shares is a Liability
  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit
  • Iran-Linked Threat Actors Leak Visitors and Athletes’ Data from Saudi Games
  • UK: Oxford City Council still investigating cyberattack from earlier this month
  • Steelmaker Nucor Says Hackers Stole Data in Recent Attack
  • People’s Republic of China cyber threat activity: Cyber Threat Bulletin
  • Ukrainian Web3 security auditing company Hacken suffered an attack that allowed a hacker to create 900 million HAI tokens
  • McLaren provides written notice to 743,131 patients after ransomware attack in July 2024 (2)
  • A state forensics lab was leaking its files. Getting it locked down involved a number of people.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.