DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Louisiana man sentenced for role in debit card ring; over 2000 victims

Posted on December 10, 2010 by Dissent

Amon Rashad Peoples, 24, of Mer Rouge, La., was sentenced to a total of 111 months in prison for access devise fraud, aggravated identity theft, and attempted bank fraud, United States Attorney Stephanie A. Finley announced yesterday. Peoples was ordered to pay restitution in the amount of $93,966.79 and was also sentenced to 5 years supervised release following the completion of his prison sentence. The sentence was imposed by Chief U. S. District Judge Robert G. James in Monroe.

According to court testimony, Peoples is responsible for fraudulently accessing over 2,000 different customer accounts involving over 60 financial institutions. Peoples and others at his direction made thousands of dollars in unauthorized charges through the use of counterfeit debit, credit, and gift cards that they manufactured.

From July 2005 to June 2009, Peoples and his co-conspirators fraudulently obtained debit and credit card numbers belonging to various individuals and transferred this information to counterfeit cards. Peoples was arrested after he attempted to purchase individual bank account numbers from a Regions Bank employee, who notified law enforcement. The investigation further revealed that Peoples and other working with him transferred a portion of the money obtained during this scheme to other co-conspirators in China and Russia.

Five others previously pled guilty to federal charges in connection with this conspiracy: Tonyell T. Toliver, 36, of Monroe, La.; Shawna Batiste, 33 of Monroe, La.; Ben Simpson, 23, of Canton, Miss.; Demetricus Watson, 23, of Olive Branch, Miss.; and Dominique Flynn, 23, of Memphis, Tenn.

The case was investigated by Special Agent Darron N. Craft, U. S. Secret Service, Baton Rouge Resident Office, Special Agent Clint Cannon, U. S. Customs Service, and the Louisiana State Police. The case was prosecuted by Assistant U. S. Attorney Cytheria D. Jernigan.

Previous reference to this case on DataBreaches.net can be found here. Once again, it seems, we are not told how the criminals obtained the identity or account information. Did they buy it on the Internet or acquire it by some other means? I wish all U.S. Attorneys would start routinely incorporating some statement about how the identity information was compromised.

Source: U.S. Attorney’s Office, Western District of Louisiana

No related posts.

Category: Breach IncidentsID TheftU.S.

Post navigation

← WI: UW-Madison warns 60,000 of old ID card data hack
Ie: Details of 500,000 GAA members compromised →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information
  • UK police arrest four in connection with M&S, Co-op and Harrods cyberattacks (1)
  • At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy
  • Avantic Medical Lab hacked; patient data leaked by Everest Group
  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets
  • Franklin, Tennessee Resident Sentenced to 30 Months in Federal Prison on Multiple Cyber Stalking Charges
  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.