File Copy Souti Ern District of New York ------Moihammed Fezzani, Cirenaca Foundation, Dr

Total Page:16

File Type:pdf, Size:1020Kb

File Copy Souti Ern District of New York ------Moihammed Fezzani, Cirenaca Foundation, Dr UNITED STATES DISTRICT COURT FILE COPY SOUTI ERN DISTRICT OF NEW YORK ----------------------------------------- - MOIHAMMED FEZZANI, CIRENACA FOUNDATION, DR. VICTORIA BLAND. LESTER BLANK, JAMES AND JANE BAILEY, v T BA 1'DE' L LTD_, MARGARET AND PATRICK M BURGESS, BOOTLESVILLE TRUST and ADAM JURY TRIAL DEMANDED CLING- COMPLAINT FOR SECURITIES Plaintiffs FRAUD, MARKET -against- MANIPULATION, RICO AND COMMON LAW CLAIMS BEAR, STEARNS & COMPANY, INC_, BEAR STEAMS SECURITIES CORP,-RICHARD HARRITON, ANDREW BRESSMAN, ARTHUR BRESSMAN, RICHARD ACOSTA, GLENN O'HARE. JOSEPH SCANNI, BRETT HIRSCH, _ GARVEY FOX, MATTHEW HIRSCH, RICHARD SIMONE, CHARLES PLAIA, JOHN McANDRIS, JACK WOLYN'EZ. ROBER'IT GILBERT, FIRST IHANOVLR SECURITIES, INC., 13ANQUE AUDI SUISSE GENEVE, FOZIE FARKASH, RAWAI RAES, BASIL SHIBLAQ, 1YAD SHIBLAQ, KEN -- STOKES, ISAAC R. DWECK, INDIVIDUALLY 1, t7 1J C and as custodian for NATHAN DWECK, BARBARA DWECK, MORRIS L O ' 1999 RALPH L DWECK, MILLO DWECK, BEATRICE DWECK, R.ICHARD DWECK, JACK DWECK, U . S D =D N Y ISAAC B. DWECK, HANK DWECK, MORRIS WOLFSON, ARIELLE WOLFSON, AARON WOLFSON, ABRAHAM WOLFSON, TOVIE WOLFSON, ANDERER ASSOCIATES, BOSTON PARTNERS, WOLFSON EQUITIES, TURNER SCHARER, CHANA SASHA FOUNDATION, UNITED CONGREGATION MESARAH. FAHNESTOCK & CO. INC., DONALD & CO., BARRY GESSI R_ MICHAEL RYDI R_ and APOLLO EQUITIES, Dcisndants_ ------------------------------------------------------ {^:\U<xu,ncrosU3car S, cam sV' ! cadincslCoa , pl arn, 7-,S 9 5 ,silo _ , CIS .. TABLE OF CONTENTS NATURE OF THE ACTION . - - - - - ............................. -?- AN OUTLINE OF THE FRAUDULENT SCHEME ........................... .... - 3- (a) The Way the Scheme Was Supposed to Work .......... ... ..... - 4- (b) The Built- in Guarantee of Collapse And Loss to Baron Investors . ........... -7- A SUMMARY OF THE CLAIMS AGAINST THE DEFENDANTS IN THIS ACTION _11- (a) The Baron Defendants ......................... ..................... .12- (b) Bear Steams ................................. ..................... -1?- (c) The Broker Defendants ..................... ... .. .... ....... -13- (d) The Individual Defendants ...... ..... -113' (e) The Apollo Defendants ......................... ..................... .14- JURISDICTION AND VENUE ............................................... -15- PARTIES ...................................................... --------- - 16- (a) Plaintiffs ................. ...................................... -16- (b) Defendants And Their Co-conspirators ................................. - 17- FACTUAL BACKGROUND ................................................. -21- (a) The History of Manipulation of Baron's Founders, Weissman and Bressrnan .. -21- (i) The Manipulation of CMSI and HPI, Up to The Start of Baron 2 2) - -^7- (a) CMSI ........ ...................................... (b) HPI ................................................ -23- (b) The Founding of Baron With Bear Steams as Its Clearing Broker ............ -26- (i) Bear Stearns's Clearing Business ............................. -28- (ii) Bear Stearns Agrees to Clear for Baron Despite Its Knowledge of Fraud ............................ ................. -29- (iii) Baron Manipulates Its First IPO, Cypros, Then Changes Clearing Brokers ........................................... -31- (c) Baron's Continued Manipulation until the Crash of June 1993 ............. 34- (d) Baron Is Forced Temporarily Out of Business, Causing The Crash of All Manipulated Securities ........................................ .... -36- (e) Baron's Continued Fraud, From August 1993 Through February 1995 ...... (i) Baron Comes Back with the Innovir IPO ........................ -38- (ii) Baron Expands Its Staff and The Scope of Its Manipulation by Adding the Hirsch Group .................................... -39- (iii) In an Attempt to Avoid a Crisis, Baron Engages in Widespread Illegal "Parkin?" with the Broker Defendants and the Individual Defendants -43- F \Documcnts\Bcar Stcarns\PlcadngsiCoinplaint 1-2S-99.pd 12/i/99 3:0? PM (iv) Baron is Saved From Collapse When Adler Coleman, Fails ......... -46- (0 Baron ' s Final Year And a Half of Fraud And Manipulation , February 1995 Through July 1996 ........................................... -46- (i) Baron Gets Kicked out by its Clearing Broker Hanifen, But Despite Overwhelming Evidence of Fraud , Bear Stearns Comes to its Rescue . -50- (ii) Bear Stearns ' s Strong Support Lulls Investors into Further Business with Baron ------- .------------- ........ ...... -^-;- (iii) Baron Steps up its Fraud with Bear Stearns's I-Jell) . .. .. ....... -SS- (iv) Bear Stearns Agrees to the Fraudulent PaperClip " Bait and Switch " -67- (v) Bear Stearns Assumes Control over Baron ' s Tradin _ _ _ _ _ _ _ __ _ -71- (vi) In Return for $3 Million Bear Stearns Agrees To Keep Clearing for Baron and the Fraud Continues ... ... ................. 74- (a) The "Brown Bag" Bribery Deals ... .................... -79- (b) Baron Continues its Manipulation And Fraud until Forced out of Business ...................................... -4^2- THE REGULATORY AND CRIMINAL FINDINGS OF FRAUD ..... ............. -RB- 1,1 RS'f CLAIM FOR RELIEF ................................................. -90- (Securities Fraud - Section 10(b) of the Exchange Act and Rule I (fib-5) (iMisrepresentations and Omissions) SE(X)Nl) CLAIM FOR RELIEF ---------------------------------------------- -94- (Securities Fraud -Section 9) (Market Manipulation) THIRD CLAIM FOR RELIEF .. - - - . - - ..................... -96 (Securities Fraud - Section 10(b), Rule I Ob-5) (Market Manipulation) FOURTH CLAIM FOR RELIEF .............................................. -97- (RICO) FIFTH CLAIM FOR RELIEF ................................................ 101 (Aiding and Abetting Breach of Fiduciary Duty) SIXTH CLAIM FOR RELIEF ................................................ - 10I- (Common Law Fraud) 1='VI)oauntntti'.11car5iaanilYlcadan_.,VCo-p1auv 1-20-97.^^id -1^- 2/1/99 3:05 I'M Plaintiffs Mohammed Fezzani, Cirenaca Foundation, Dr. Victoria Blank, Lester Blank, James and Jane Bailey, Baydel Ltd_, Margaret and Patrick Burgess, Bootlesville Trust and Adam Cunp, by their attorneys Folkenflik & McGerity, for their Complaint against the defendants. allege= NATURE OF THE ACTION This is an action which arises out of the criminal conduct of A.R. Baron & Co_. Inc. ("Baron")_ Baron was a New York broker-dealer which operated from approximately May of 1992 until its bankruptcy in July 1996. Conspiring with a network of inter-related persons and entities, including in particular the defendants herein, Baron engaged in a fraudulent scheme to obtain millions of dollars in illicit profits through the fraudulent sale and manipulation of securities. Plaintiffs collectively lost over $6.5 million as a result of the criminal conduct described below. 2. Baron itself, and 14 former officers and employees, twelve of whom are defendants in this action, have pleaded guilty to felony charges in Supreme Court, New York County. The other two have filed for protection under the bankruptcy code. The sole indicted Baron officer, who did not plead guilty, was convicted by a jury of 25 separate felony counts. On information and belief, the grand jury is still sitting and further indictments, including an indictment of defendant Bear Steams Securities Corp. ("Bear Stearns Securities" or collectively with its parent Bear Stearns & Co. "Bear Stearns"), and its chief executive, Richard Harriton, ("Harriton"), are expected shortly. i \Documenls\I r Stcamt\l11-dings\Compl.ml 1-)8-99 ,,Pd -2- 2/1/99 3:05 I'M Baron manipulated two stocks it "inherited " when it was founded, Health Professionals. Inc. and Cyro Medical Sciences, Inc. ("CMSI"), several stocks for which it underwrote the initial public offerings ("IPOs"), Cypros Pharmaceuticals Corp. ("Cypros"), Innovir Laboratories, Inc. ("Innovir"), Voxcl, and PaperClip Imaging Software ("PaperClip"), four stocks brought to it by a group of brokers it hired in 1994, Advanced Mammography Systems, Inc_ ("Mammo"), Symbollon, Inc. ("Symbollon"), Aqua Care Systems, Inc_ ("Aqua"), Laser Video Network ("Laser Video"), and several stocks, referred to as "cash stocks" or "bag -jobs" for which, Baron and several Baron brokers accepted bribes in return for selling those securities to its customers at inflated prices, Jockey Club, Inc. ("Jockey Club"), Comprehensive Environmental Systems ("CEIS"), Icis Management Group ("Icis"), and U.S. Bridge of New York Inc- ("U.S. Bridge")(hereafter referred to collectively as the "Manipulated Securities" or, when referring to the Companies, the "Manipulated Companies"). During the relevant period, the Manipulated Securities constituted approximately 98% of the stocks traded by Baron. AN OUTLINE OF THE FRAUDULENT SCHEME 4. Because Baron's criminal conduct followed a repetitive pattern, stock-after-stock, year after year, knowledge of the general scheme clarifies how defendants' conduct fits into Baron's broader criminal enterprise. The Baron conspiracy, like all criminal conspiracies, was conducted in secret, and plaintiffs have not yet had access to all material information. However, plaintiffs have been able to piece together the details set forth below based upon. among other things, (a) public records from the criminal trial of Baron and its brokers, including sworn guilty rVD-un-t, \ Rcar StcamcVPlcadinpcVComplainf 1-28-99 I)d -3- U1199 3 05 PM pleas and sworn trial testimony of the criminal participants themselves, ( b) admissions by Baron_ now acting under the control of a
Recommended publications
  • Using Oracle Commerce
    Using Oracle Commerce F41708-01 July 2021 Using Oracle Commerce, F41708-01 Copyright © 1997, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • 1 BIDDER BEWARE TOWARD a FRAUD-FREE MARKETPLACE – BEST PRACTICES for the ONLINE AUCTION INDUSTRY Paula Selis Anita Ramasastry
    BIDDER BEWARE TOWARD A FRAUD-FREE MARKETPLACE – BEST PRACTICES FOR THE ONLINE AUCTION INDUSTRY Paula Selis* Anita Ramasastry** Charles S. Wright*** Abstract: This report presents to businesses, consumers and government officials (including law enforcement) a “menu of options” for combating fraud in the online auction industry. By directly interviewing several major online auction sites and cataloging the features of other sites, the Washington Attorney General’s Office, in conjunction with the Center for Law Commerce and Technology at the University of Washington Law School, has attempted to identify a series of “best practices” in the online auction industry. The results of these interviews as well as findings from investigation of current practices on the Web are presented here. By identifying the most successful, innovative, and feasible practices, this report seeks to maximize the reach of industry solutions and thereby promote industry-wide self-regulation. Standardization is a powerful tool for eradicating fraud across the industry. However, divergent business models and differing consumer needs mean that there is no one size that fits all models. This report presents a pro-active collaboration between enforcement agencies, industry, and academia. It also suggests a menu of best practices from which users might choose to suit their needs, and invites comment, critique and improvement upon those practices. INTRODUCTION Produced by the Washington State Attorney General’s office and the Center for Law Commerce and Technology at the University of Washington Law School, this report surveys the current range of responses to the problem of online auction fraud. This report presents the results of that survey in the form of a menu of options for businesses and consumers.
    [Show full text]
  • Gram for Sechelt May Day E Accomplishments at Gibsons
    XT l' u * _• i» w • •*• —« — PROVINCE AI Victoria, -B Phone your news or orders to mons •j -. -;u Seventh Year ofPublication ThtirstJay May 14, 1953 r <Vol 7-19 Published in GIBSONS, B.C. Serving the Sunny Sechelt Peninsula upen House Pender Hospital ; Sunday, May 2l|hj St. Mary's Hospital at Pender|Harbour will open its doors and welcome all At Sechelt on May 7th, a good crowd filled the Legion Hall to^ comers who would like to in­ hear the Liberal Candidate for the Mackenzie Riding, Mr Batt spect, or just visit,lor who would Maclintyre. Capt. A. Johnston was chairman for the meeting, and like to see demonstrations of presented Mr. Maclntyre and his campaign manager, Mr. Harry Hospital Equipment/in use. Davies, from Powell River. Batt announced the Liberal platform in its broader aspects, and then went into some detail on several Marda Walker Wendy Yates Judy Gray The Hospital Committee ad­ vises that from one hi the after­ points immediately concerning most listeners. noon until eight, in, the evening, The practice of /paying for — visitors will be -welcome, and Roads and kindred Provincial gram For Sechelt May Day especially schoot^students. expenditures by the long-term During the "afternoon, light loan method was fully covered. m WSfc If planning, rehearsing and at­ President Orv Moscrip will MC refreshments will be. served to Mr. Maclntyre explained that tention to detail are any criter- the day. those who wish. our anticipated revenue from ian for success, Sechelt is slated The -retiring queen is Diana the three cent share of the gas­ # The committee Chairman sta­ 1 for the most outstanding May Wheel%, daughter of Mr., and tes that there have been several oline tax was used as collateral Day in its history of May Days.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Why Increased Data Threats Are Driving Draas Adoption.Ai
    Why Increased Data Threats Are Driving THREATS are coming from internal and external sources EXTERNAL THREATS INTERNAL THREATS Cyber Attacks Viruses Equipment Loss Application Specific Hacks Phishing Email Actions Phishing Human Error BYOD + IoT Adoption Disgruntled Employees Natural Disasters Excessive Access Levels Insufficient Employee Vetting Social Engineering SECURITY THREATS ARE INCREASING BUT SO ARE NATURAL th 2017 Hurricane Season is 7th most active in DISASTERS 7U.S. History 2017 ITIT prospros areare rethinkingrethinking Incidents of ransomware in healthcare are on the rise, causing 72% of the industry’s cyber security IT downtime costs are estimated attacks. Are you prepared? at $26.5 billion in lost revenue. Can your company afford to not have a disaster recovery plan in place? Customers expect 24x7 availability. Downtime generally means a loss of clients and revenue. COMPLIANCE & AUDITS RAPID DATA GROWTH DOWNTIME Businesses need to keep data for COSTS 90% of all the data in the world has compliance, audit or tax purposes. been generated over the last two Don’t assume the right technology years. You can no longer keep buying is in place. Having only one copy of more disc space. Today’s companies data is generally a huge mistake. need a better approach to data management and disposal. MACHINE & MAN-MADE FAILURE DIFFERENT DATA SOURCES Combined, technology and human NEED PROTECTION error account for over 50% of data With the evolution of the cloud, loss. This means that your business companies must protect, on-premise data has a 50% chance of loss due data as well as cloud-native apps. to simple man or machine-made The old technologies just can’t cut it.
    [Show full text]
  • Cyber Frauds, Scams and Their Victims 1St Edition Pdf, Epub, Ebook
    CYBER FRAUDS, SCAMS AND THEIR VICTIMS 1ST EDITION PDF, EPUB, EBOOK Mark Button | 9781138931206 | | | | | Cyber Frauds, Scams and their Victims 1st edition PDF Book Defamation Invasion of privacy Intrusion on Seclusion False light Breach of confidence Abuse of process Malicious prosecution Alienation of affections Criminal conversation Seduction Breach of promise. Big Data Saswat Sarangi author Apart from fraud, there are several related categories of intentional deceptions that may or may not include the elements of personal gain or damage to another individual:. While the precise definitions and requirements of proof vary among jurisdictions, the requisite elements of fraud as a tort generally are the intentional misrepresentation or concealment of an important fact upon which the victim is meant to rely, and in fact does rely, to the harm of the victim. Given the international nature of the web and ease with which users can hide their location, obstacles to checking identity and legitimacy online, and the variety of hacker techniques available to gain access to PII have all contributed to the very rapid growth of Internet fraud. April Cyber security officials in the UK begin to worry as the BBC demonstrates how easy it is to purchase fraudulent rail tickets via the dark web. A year-old-boy was arrested in Northern Ireland for attempting to purchase a Soviet era submachine gun on the dark web. Retrieved 18 September Compounding Malfeasance in office Miscarriage of justice Misprision Obstruction Perjury Perverting the course of justice. Beyond laws that aim at prevention of fraud, there are also governmental and non-governmental organizations that aim to fight fraud.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Business Ethics
    Business Ethics Business ethics is a form of the art of applied ethics that examines ethical rules and principles within a commercial context, the various moral or ethical problems that can arise in a business setting and any special duties or obligations that apply to persons who are engaged in commerce. Business ethics can be both a normative and a descriptive discipline. As a corporate practice and a career specialization, the field is primarily normative. In academia descriptive approaches are also taken. The range and quantity of business ethical issues reflects the degree to which business is perceived to be at odds with non-economic social values. Historically, interest in business ethics accelerated dramatically during the 1980s and 1990s, both within major corporations and within academia. For example, today most major corporate websites lay emphasis on commitment to promoting non-economic social values under a variety of headings (e.g. ethics codes, social responsibility charters). In some cases, corporations have redefined their core values in the light of business ethical considerations (e.g. BP's "beyond petroleum" environmental tilt). Overview of Issues in Business Ethics General Business Ethics © 2014 All Star Training, Inc. Page 1 This part of business ethics overlaps with the philosophy of business, one of the aims of which is to determine the fundamental purposes of a company. If a company's main purpose is to maximize the returns to its shareholders, then it could be seen as unethical for a company to consider the interests and rights of anyone else. Corporate social responsibility or CSR: an umbrella term under which the ethical rights and duties existing between companies and society is debated.
    [Show full text]
  • Eric L. Carlson
    CARLSON.DOC 1/5/2007 11:04:55 AM PHISHING FOR ELDERLY VICTIMS: AS THE ELDERLY MIGRATE TO THE INTERNET FRAUDULENT SCHEMES TARGETING THEM FOLLOW Eric L. Carlson Internet usage is no longer limited to a young, tech-savvy subset of the population. As elderly people use the Internet in increasing numbers, the con artists who prey on them adapt their tactics accordingly. In this note, Eric Carlson explains why the elderly are especially susceptible to Internet fraud. He describes three fraudulent schemes regularly perpetrated against the elderly and the devastating effects they have on older Americans. While relevant legislation, prosecution of offenders, and education of the elderly all help to alleviate the occurrence of fraud, the problem persists. Mr. Carlson concludes that legislation and enforcement measures are helpful but insufficient to address the problem, and that society—including neighbors, family, and especially young, tech-savvy friends—has an obligation to help elderly people avoid falling victim to fraudulent Internet schemes. Eric L. Carlson is Notes Editor 2006–2007, Member 2005–2006, The Elder Law Journal; J.D. 2007, University of Illinois, Urbana-Champaign; B.S. 2004, University of Illinois, Urbana-Champaign, College of Engineering. The author would like to thank his parents, Stephen and Joanne Carlson, for their con- tinued support and encouragement. Go Illini! CARLSON.DOC 1/5/2007 11:04:55 AM 424 The Elder Law Journal VOLUME 14 I. Introduction To a large degree, the Internet is synonymous with a hip, tech-savvy, and young demographic. Heavily influenced by pop culture and the mainstream media, the modern-day Internet is typically characterized by young entrepreneurs, teenage hackers, bloggers, social networking Web sites, online gaming, and file- sharing.
    [Show full text]
  • Keeping Rogue Traders at Bay
    Portfolio Media. Inc. | 860 Broadway, 6th Floor | New York, NY 10003 | www.law360.com Phone: +1 646 783 7100 | Fax: +1 646 783 7161 | [email protected] Keeping Rogue Traders At Bay Law360, New York (October 04, 2011, 4:27 PM ET) -- On Sept. 16, 2011, Kweku Adoboli, a native of Ghana and UBS AG employee, was charged with fraud arising out of unauthorized trading. UBS estimates that Adoboli’s rogue trading continued for three years and caused it to incur losses of $2.3 billion. Banks, lawyers and other industry specialists are all posing the same question: Given UBS’ sophisticated risk procedures, how did Adoboli’s rogue trading go undetected for so long? And what lessons can the industry learn? A Little Background Adoboli joined UBS’ London investment banking division as an analyst in 2003 after graduating, with honors, from the University of Nottingham in England. Adoboli served a so-called “back-office” function: He entered and confirmed trades, handled accounting issues and transmitted payments. In September 2006, he began trading exchange-traded funds (ETFs) on UBS’ “Delta-One” trading desk. The trading involves two steps. First, a client initiates a trade in an ETF that bets on the direction of a group of stocks, such as European or U.S. stocks. The trader executes the trade and acquires the basket for UBS. Second, the trader hedges the trade by creating a mirror trade of the bet. Adoboli skipped the second step and made unauthorized unhedged trades on the direction of European and U.S. stock markets using UBS funds.
    [Show full text]
  • Dd/Dsd Cds Procedures Manual for Adm 21/04/17 Appendices
    DD/DSD CDS PROCEDURES MANUAL FOR ADM 21/04/17 APPENDICES NO TITLE 1 Authorised Signatories For System Access 2 CDS Data Entry Supervisors List 3 User ID Application Form 4 Notification Letter 5 User ID/Password Application Acknowledgement Slip 6a Task / Printer Assignment Sheet – Group One 6b Task / Printer Assignment Sheet – Group Two 7 Task Grouping 8 Application To Activate / Deactivate / Remove CDS User ID Form 9 Removal Of CDS User ID Letter 10 Deactivation Of CDS User ID Letter 11 Reset Password Application Form 12 Application To Use The CDS Terminal/Printer Form 13 Sample Of Specimen Signature Card 14 Checklist For Verification Of Opening An Account 15 Guidelines On Account Qualifier 16 Criteria For Board Resolution 17 Usage Of Power Of Attorney 18 Letter Of Indemnity For Facsimile Signatures 19 Standard Identification Guidelines On Data Entry Of Depositor’s Identification Number In CDS 20 Participant Accounts Listing 21 Principal And Nominees Account Report 22 Certificate Of Incorporation 23 Certificate Of Incorporation On Change Of Name Of Company 24 Return Of Allotment Of Shares 25 Notice Of Situation Of Registered Office And Of Office Hours And Particulars Of Change A - 2 DD/DSD CDS PROCEDURES MANUAL FOR ADM 21/04/17 APPENDICES NO TITLE 26 Permitted Updates Of Account Qualifier By Authorised Nominees 27 ## (Deleted) 28 Account / Investor Audit Report 29 ## (Deleted) 30 Checklist For Verification Of FMN040 “Application For Closing Of Account” Form 31 ## (Deleted) 32 ## (Deleted) 33 Application For Suspension/Release Of Suspension
    [Show full text]
  • Broker-Dealers As Catalysts for Reform, 16 B.C.L
    Boston College Law Review Volume 16 Article 2 Issue 3 Special Issue The Securities Laws: A Prognosis 3-1-1975 Regulating Discretionary Management: Broker- Dealers as Catalysts for Reform Harvey E. Bines Follow this and additional works at: http://lawdigitalcommons.bc.edu/bclr Part of the Securities Law Commons Recommended Citation Harvey E. Bines, Regulating Discretionary Management: Broker-Dealers as Catalysts for Reform, 16 B.C.L. Rev. 347 (1975), http://lawdigitalcommons.bc.edu/bclr/vol16/iss3/2 This Article is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. REGULATING DISCRETIONARY MANAGEMENT: BROKER-DEALERS AS CATALYSTS FOR REFORM HARVEY E. BINES * Over the last decade, there has been a remarkable increase in the number of broker-dealers offering or promoting discretionary management services.' In "discretionary" accounts, authority is granted an investment manager to make investment decisions and execute them for the benefit of a client without the obligation of consulting with, or obtaining prior approval from, the client. 2 An increasing number of houses are offering discretionary man- agement services directly or through affiliates, and they are actively soliciting clients to turn their accounts over for expert management. Other broker-dealers, not offering discretionary management ser- vices themselves or through affiliates, are referring customers to investment advisers who in turn pay compensation for the referrals or rely on referring broker-dealers for executions and custody of client accounts.
    [Show full text]