Arrested for scam of $ 16.000 in Apple products

Apple-store

Undoubtedly, it is something that can happen - unfortunately - to any current company, but of course, when it happens in an Apple store the news spreads quickly through the network. Apparently two scammers armed with false identities made several purchases in an Apple Store in New York and in another store of an American operator where Apple devices are sold.

According to the official sources of the investigation, these two criminals were posing as another person with falsified identity documents. These are two young people of 23 and 25 years old who spent a total of $ 16.000 (not all at once) on devices and then resell them at a lower price for a clean profit.

It seems that they used false identity documents and credit cards with the same photo but with different names in order to make purchases and not be discovered. One of them was arrested while making a purchase in Ohio and the other was discovered thanks to the information provided to the authorities by an Uber user, when I dropped him off at Cleveland Hopkins International Airport.

Sharon Laverne 2014

Sharon Laverne 2014

It is not the first time and I do not think it is the last time that the Cupertino company has suffered one of these scams. Apple devices are undoubtedly attractive to all users, even those who want to perform an action of this type. Obviously the play has gone wrong for them and now they will face justice for just $ 16.000, and I say "just" because what I think was the biggest scam in the purchase of Apple products was carried out in 2014, Sharron Laverne Parrish Jr (top photo) who also made some purchases in Apple stores but in that case the value of the scammed products reached $ 300,000.


Buy a domain
You are interested in:
The secrets to launching your website successfully

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.