DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

AZ: Glendale police arrest credit card worker in identity theft

Posted on September 26, 2011 by Dissent

Morgan Tanabe reports:

Glendale police arrested a credit card company worker and her boyfriend suspected of identity theft and the use of a stolen credit card, according to a court document.

Las Vegas resident Amanda Shepherd, who works as a customer service representative at Citi Cards, was arrested Tuesday. George Nelson was arrested on Sept. 2.

The court filing said Nelson used a stolen credit card to purchase $14,725 in merchandise from multiple stores in Glendale and around the Valley over a two-day period in August and September. Some of the items included an Apple iPad 2 from a Walmart and a $6,820 diamond ring from Zales at Paradise Valley Mall, the filing said.

The first time the credit card was denied, at a store in Metrocenter Mall, Nelson called Shepherd at work where she unblocked the account and Nelson was again able to use the credit card, the filing said.

[…]

They also found a notebook with a list of people’s personal information, the document said.

At Nelson’s apartment, police found another notebook of people’s names, date of birth, social security numbers and other personal information, the filing said.

Read more on AZcentral.com.

But where did all that stolen information come from? How much of the data were acquired from Citi Cards customers, and what other sources were there?  And if the data were stolen from Citi, did Citi detect the improper access or did they only find out because of the arrest?

It would be nice to have a clear statement about this and some statement as to how many customers’ data were actually stolen.  Jailbase.com indicates that Shepherd was charged with drug offenses; there is no mention of any identity theft charges in her case, although Nelson was charged with fraud-related charges.

Several requests to the Glendale Police Department for additional clarification have not been answered. I will update this entry if they provide the requested information.


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Breach IncidentsID TheftU.S.

Post navigation

← AU: Hackers published personal data of 25,000 police officials
Mass. man, RI accomplice face ID theft charges →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.