DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VA: Gift Card Re-encoder sentenced to 13 years

Posted on January 29, 2010 by Dissent

Jerry A. Diggs, 31, of Middletown, Delaware, was sentenced Wednesday to 132 months on a charge of conspiracy to commit wire fraud, a consecutive 24 months on a charge of aggravated identity theft, followed by three years of supervised release and the requirement of restitution in the amount of $230,644.56 to over one hundred victims. Neil H. MacBride, Acting United States Attorney for the Eastern District of Virginia, made the announcement after Diggs’ sentencing before United States District Judge Raymond A. Jackson.

Diggs pled guilty on September 16, 2009 to one count of conspiracy to commit wire fraud and one count of aggravated identity theft. The plea resulted from the defendant’s participation in a large scale gift card re-encoding scheme. The investigation revealed that the defendant and other conspirators would purchase and/or steal gift cards issued by a number of vendors, including American Express, Visa, and other merchants. The conspirators would re-encode the gift cards with the credit account numbers belonging to actual credit card accounts of American Express card holders. In the course of doing so, approximately sixty-seven credit card accounts of other individuals were compromised. The defendant and other conspirators would travel within Virginia, Maryland, Delaware and other states, and purchase goods and services with the re-encoded gift cards. The re-encoded gift cards appeared normal and legitimate to merchants. The use of the re-encoded gift cards resulted in charges accruing to the accounts of the legitimate individual credit card holders.

After the defendant was indicted on federal charges in December 2008, he was observed in Newport News, Virginia, on December 24, 2008. A Newport News police officer attempted to arrest the defendant when the defendant was entering the passenger side of a vehicle. The defendant fought with the officer and instructed the driver of the vehicle to drive away with the officer caught in the doorframe of the vehicle. The officer was dragged along the street and sustained injuries. The defendant was arrested on December 25, 2008, after fleeing to Delaware.

This case was investigated by the United States Secret Service and the Newport News Police Department. Assistant United States Attorney Brian J. Samuels prosecuted the case on behalf of the United States.

Source: U.S. Attorney’s Office, Eastern District of Virginia


Related:

  • They were victims of a massive data breach in 2009. Interior Health denied it for a decade.
  • The Identity Theft Resource Center Remains Open to Victims Amid Government Shutdown
  • Kosovo National Pleads Guilty To Operating An Online Criminal Marketplace
  • Fake ID website busted; Dutch police deal a blow to criminal infrastructure
  • Two Defendants Plead Guilty To Fraud Scheme Involving Data Stolen From Hospital Patients
  • 39-year-old Nigerian extradited to US from France over alleged hacking
Category: ID Theft

Post navigation

← Telemarketers and Five Banks Are in Cahoots, Class Claims
NY: Police Investigating Laptop Theft, Security Breach of 1,400 Columbia Affiliates →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.