DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Running an ID theft ring from inside prison adds 14 years to sentence

Posted on January 18, 2011 by Dissent

A man who lead an identity-theft ring that ran up a quarter-million dollars worth of charges from inside a federal prison – and who continued the criminal activity even after pleading guilty to the charges – as sentenced to more than 14 years in prison, Steven M. Dettelbach, United States Attorney for the Northern District of Ohio, announced today.

“The defendant thought he found a way to occupy his time in prison,” Dettelbach said. “With this prosecution and this sentence, he’ll have lots more time to learn to follow the rules.”

Dimorio McDowell, age 34, of Atlanta, Georgia, previously pleaded guilty to aggravated identity theft and conspiracy to commit wire fraud and bank fraud. McDowell was an inmate at Fort Dix Federal Correctional Institution at the time of the scheme, which took place between August 2009 and April 2010. U.S. District Judge Donald Nugent ordered McDowell’s 174-month sentence on this case begin in 2014, when he completes the current sentence that resulted in his incarceration at Fort Dix.

McDowell was the ringleader who obtained personal information on people who had credit card accounts at various retailers, including Best Buy, Home Depot, J.C. Penney, Lowe’s, Macy’s, Nordstrom’s, Saks Fifth Avenue, Sears and Staples, according to court documents.

McDowell contacted the retailers and impersonated the true account holders, store employees or corporate fraud investigators. He used information about the account holders, such as name, address or Social Security number, during those calls to obtain additional information about them and adding co-conspirators names as authorized users of the accounts, thus taking over the accounts, according to court documents.

After taking over the accounts, adding additional users to the accounts and opening new accounts, McDowell communicated with his co-conspirators, all of whom lived in the Cleveland area.

McDowell continued to run his scheme from prison even after he was charged and after he pleaded guilty. He also posed as a deputy U.S. Marshal over the telephone and attempted to have prisoners moved, according to information presented during the sentencing hearing.

Overall, the ring purchased more than $254,000 worth of merchandise as part of their scheme, according to court documents.

Also charged in the case are: Andre Reese, 37; Jeffery McClain, 39; Kevin McBride, 34; Michael Sailes, 51; Edwin Peavy, 52; Daniel Ashford, 37; James L. Wiggins, 47, and Jay Williams, 27, all of Cleveland, Ohio. All have entered guilty plea to charges against them.

Source: United States Attorney, Northern District of Ohio

Category: Breach IncidentsID TheftOtherU.S.

Post navigation

← SC: Restaurant Customers’ Credit Card Info Stolen
UK: Trust apologizes for stolen patient information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.