DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Louisiana man sentenced for role in debit card ring; over 2000 victims

Posted on December 10, 2010 by Dissent

Amon Rashad Peoples, 24, of Mer Rouge, La., was sentenced to a total of 111 months in prison for access devise fraud, aggravated identity theft, and attempted bank fraud, United States Attorney Stephanie A. Finley announced yesterday. Peoples was ordered to pay restitution in the amount of $93,966.79 and was also sentenced to 5 years supervised release following the completion of his prison sentence. The sentence was imposed by Chief U. S. District Judge Robert G. James in Monroe.

According to court testimony, Peoples is responsible for fraudulently accessing over 2,000 different customer accounts involving over 60 financial institutions. Peoples and others at his direction made thousands of dollars in unauthorized charges through the use of counterfeit debit, credit, and gift cards that they manufactured.

From July 2005 to June 2009, Peoples and his co-conspirators fraudulently obtained debit and credit card numbers belonging to various individuals and transferred this information to counterfeit cards. Peoples was arrested after he attempted to purchase individual bank account numbers from a Regions Bank employee, who notified law enforcement. The investigation further revealed that Peoples and other working with him transferred a portion of the money obtained during this scheme to other co-conspirators in China and Russia.

Five others previously pled guilty to federal charges in connection with this conspiracy: Tonyell T. Toliver, 36, of Monroe, La.; Shawna Batiste, 33 of Monroe, La.; Ben Simpson, 23, of Canton, Miss.; Demetricus Watson, 23, of Olive Branch, Miss.; and Dominique Flynn, 23, of Memphis, Tenn.

The case was investigated by Special Agent Darron N. Craft, U. S. Secret Service, Baton Rouge Resident Office, Special Agent Clint Cannon, U. S. Customs Service, and the Louisiana State Police. The case was prosecuted by Assistant U. S. Attorney Cytheria D. Jernigan.

Previous reference to this case on DataBreaches.net can be found here. Once again, it seems, we are not told how the criminals obtained the identity or account information. Did they buy it on the Internet or acquire it by some other means? I wish all U.S. Attorneys would start routinely incorporating some statement about how the identity information was compromised.

Source: U.S. Attorney’s Office, Western District of Louisiana


Related:

  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea's largest guarantee insurer
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak
Category: Breach IncidentsID TheftU.S.

Post navigation

← WI: UW-Madison warns 60,000 of old ID card data hack
Ie: Details of 500,000 GAA members compromised →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea’s largest guarantee insurer
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
  • North Country Healthcare responds to Stormous’s claims of a breach
  • Gladney Adoption Center had serious data exposures in the past few months. What will they do to prevent more?
  • Former U.S. Soldier Pleads Guilty to Hacking and Extortion Scheme Involving Telecommunications Companies

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations
  • ICE is gaining access to trove of Medicaid records, adding new peril for immigrants
  • Microsoft can’t protect French data from US government access
  • Texas Enacts Electronic Health Record Data Localization Law
  • Upstate NY county clerk again refuses to enforce Texas abortion judgment
  • Attorney General James Leads Coalition Urging Congress to Protect Americans from Masked ICE Agents
  • Attorney General Tong Announces $85,000 Settlement with TicketNetwork for Violations of the Connecticut Data Privacy Act​

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.