DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Louisiana man sentenced for role in debit card ring; over 2000 victims

Posted on December 10, 2010 by Dissent

Amon Rashad Peoples, 24, of Mer Rouge, La., was sentenced to a total of 111 months in prison for access devise fraud, aggravated identity theft, and attempted bank fraud, United States Attorney Stephanie A. Finley announced yesterday. Peoples was ordered to pay restitution in the amount of $93,966.79 and was also sentenced to 5 years supervised release following the completion of his prison sentence. The sentence was imposed by Chief U. S. District Judge Robert G. James in Monroe.

According to court testimony, Peoples is responsible for fraudulently accessing over 2,000 different customer accounts involving over 60 financial institutions. Peoples and others at his direction made thousands of dollars in unauthorized charges through the use of counterfeit debit, credit, and gift cards that they manufactured.

From July 2005 to June 2009, Peoples and his co-conspirators fraudulently obtained debit and credit card numbers belonging to various individuals and transferred this information to counterfeit cards. Peoples was arrested after he attempted to purchase individual bank account numbers from a Regions Bank employee, who notified law enforcement. The investigation further revealed that Peoples and other working with him transferred a portion of the money obtained during this scheme to other co-conspirators in China and Russia.

Five others previously pled guilty to federal charges in connection with this conspiracy: Tonyell T. Toliver, 36, of Monroe, La.; Shawna Batiste, 33 of Monroe, La.; Ben Simpson, 23, of Canton, Miss.; Demetricus Watson, 23, of Olive Branch, Miss.; and Dominique Flynn, 23, of Memphis, Tenn.

The case was investigated by Special Agent Darron N. Craft, U. S. Secret Service, Baton Rouge Resident Office, Special Agent Clint Cannon, U. S. Customs Service, and the Louisiana State Police. The case was prosecuted by Assistant U. S. Attorney Cytheria D. Jernigan.

Previous reference to this case on DataBreaches.net can be found here. Once again, it seems, we are not told how the criminals obtained the identity or account information. Did they buy it on the Internet or acquire it by some other means? I wish all U.S. Attorneys would start routinely incorporating some statement about how the identity information was compromised.

Source: U.S. Attorney’s Office, Western District of Louisiana

Category: Breach IncidentsID TheftU.S.

Post navigation

← WI: UW-Madison warns 60,000 of old ID card data hack
Ie: Details of 500,000 GAA members compromised →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Massachusetts hacker to plead guilty to PowerSchool data breach
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.