DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Louisiana man sentenced for role in debit card ring; over 2000 victims

Posted on December 10, 2010 by Dissent

Amon Rashad Peoples, 24, of Mer Rouge, La., was sentenced to a total of 111 months in prison for access devise fraud, aggravated identity theft, and attempted bank fraud, United States Attorney Stephanie A. Finley announced yesterday. Peoples was ordered to pay restitution in the amount of $93,966.79 and was also sentenced to 5 years supervised release following the completion of his prison sentence. The sentence was imposed by Chief U. S. District Judge Robert G. James in Monroe.

According to court testimony, Peoples is responsible for fraudulently accessing over 2,000 different customer accounts involving over 60 financial institutions. Peoples and others at his direction made thousands of dollars in unauthorized charges through the use of counterfeit debit, credit, and gift cards that they manufactured.

From July 2005 to June 2009, Peoples and his co-conspirators fraudulently obtained debit and credit card numbers belonging to various individuals and transferred this information to counterfeit cards. Peoples was arrested after he attempted to purchase individual bank account numbers from a Regions Bank employee, who notified law enforcement. The investigation further revealed that Peoples and other working with him transferred a portion of the money obtained during this scheme to other co-conspirators in China and Russia.

Five others previously pled guilty to federal charges in connection with this conspiracy: Tonyell T. Toliver, 36, of Monroe, La.; Shawna Batiste, 33 of Monroe, La.; Ben Simpson, 23, of Canton, Miss.; Demetricus Watson, 23, of Olive Branch, Miss.; and Dominique Flynn, 23, of Memphis, Tenn.

The case was investigated by Special Agent Darron N. Craft, U. S. Secret Service, Baton Rouge Resident Office, Special Agent Clint Cannon, U. S. Customs Service, and the Louisiana State Police. The case was prosecuted by Assistant U. S. Attorney Cytheria D. Jernigan.

Previous reference to this case on DataBreaches.net can be found here. Once again, it seems, we are not told how the criminals obtained the identity or account information. Did they buy it on the Internet or acquire it by some other means? I wish all U.S. Attorneys would start routinely incorporating some statement about how the identity information was compromised.

Source: U.S. Attorney’s Office, Western District of Louisiana


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Breach IncidentsID TheftU.S.

Post navigation

← WI: UW-Madison warns 60,000 of old ID card data hack
Ie: Details of 500,000 GAA members compromised →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.