Ramon Gomez, Et Al. V. Bidz.Com, Incorporated, Et Al. 09-CV-03216

Total Page:16

File Type:pdf, Size:1020Kb

Ramon Gomez, Et Al. V. Bidz.Com, Incorporated, Et Al. 09-CV-03216 2:09-cv-03216-CBM-E Document 34 Filed 10/13/2009 Page 1 of 87 1 Jeff S. Westerman (SBN 94559) jwestermanmilberg.com 2 Andrew J. Sokolowski (SBN 226685) asoko1owski(Imi1berg.com 3 MILBERG LIP 300 South Grand Avenue, Suite 3900 4 Los Angeles, California 90071 Telephone: (213) 617-1200 5 Facsimile: (213) 617-1975 6 BROWERPIVEN, A Professional Corporation David A.P. Brower 7 browerbrowerpiven.com OCT 3 2009 Jessica Sleater 8 sleaterbrowerpiven.com 488 Madison Avenue, 8th Floor ENTRALLi2- D TRICT OF CAL 9 New York, New York 10022 Y Telephone: (212) 501-9000 10 Facsimile: (212) 501-0300 11 Counsel for Lead Plaintiff and Liaison Counsel for the Class 12 [Additional Counsel Appear on Signature Page] 13 UNITED STATES DISTRICT COURT 14 CENTRAL DISTRICT OF CALIFORNIA - WESTERN DIVISION 15 RAMON GOMEZ, On Behalf of Lead Case No. CV09-03216 CBM- Himself and All Others Similarly Ex 16 Situated, (Consolidated with Nos. CV09- 17 Plaintiff, 03671 CBM; CV09-03967 CBM) VS. 18 CONSOLIDATED CLASS BIDZ.COM, INC.,, and DAVID ACTION COMPLAINT FOR 19 ZINBERG, VIOLATIONS OF THE FEDERAL SECURITIES LAWS 20 Defendants. JURY TRIAL DEMANDED 21 ROLAND POMFRET, On Behalf of Himself and All Others Similarly 22 Situated, 23 Lead Plaintiff, 24 VS. BIDZ.COM, INC., DAVID ZINBERG, 25 and LAWRENCE Y. KONG, 26 Defendants. 27 28 CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS DO4CS\4901 15v! 2:09-cv-0321 6-CBM-E Document 34 Filed 10/13/2009 Page 2 of 87 2 TABLE OF CONTENTS 3 Page 4 JURISDICTION AND VENUE ................................................................................ 1 5 PARTIES...................................................................................................................2 6 CLASS ACTION ALLEGATIONS..........................................................................6 7 SUBSTANTIVE ALLEGATIONS.........................................................................10 Materially False and Misleading Statements Issued During the Class 8 Period.................................................................................................. 10 9 OTHER FALSE AND MISLEADING STATEMENTS, SCHEMES, AND 10 ARTIFICES TO DEFRAUD DURING THE CLASS PERIOD..................47 BIDZ Uses "Shill Bidders" to Artificially Inflate the Sell Price for Its 11 OnlineAuctions ..................................................................................47 12 Bidz Used Bogus Appraisals to Artificially Inflate the Selling Prices 13 ofAuction Items .................................................................................. 51 The Truth Regarding Some of the Company's Fraudulent Schemes 14 Emerges............................................................................................... 51 15 LOSSCAUSATION ............................................................................................... 59 16 ADDITIONAL SCIENTER ALLEGATIONS .......................................................62 17 DEFENDANTS' ASSOCIATIONS AND PROPENSITY TO ENGAGE IN UNLAWFUL CONDUCT CONSISTENT WITH SCIENTER 18 ALLEGATIONS...........................................................................................68 19 Bidz Sold Unlicensed Securities Before it Attempted an IPO......................69 20 Bidz Is the Target of Numerous Lawsuits Relating to Its Business 21 Practices.............................................................................................. 69 Bidz Has Been Connected to Numerous People With Questionable 22 Backgrounds........................................................................................ 69 23 NO SAFE HARBOR...............................................................................................70 24 COUNT I Violation of Section 10(b) of the Exchange Act and Rule 1 Ob-5 25 Promulgated Thereunder (Against Defendants)...........................................71 COUNT II Violation of Section 20(a) of the Exchange Act (Against the 26 IndividualDefendants) .................................................................................. 74 27 28 CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS DOCS\4901 15v1 2:09-cv-03216-CBM-E Document 34 Filed 10/13/2009 Page 3 of 87 PRAYER FOR RELIEF .......................................................................................... 75 1 JURY TRIAL DEMANDED ................................................................................... 75 2 3 4 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 ii 28 CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS II DOCS\490115v1 2:09-cv-0321 6-CBM-E Document 34 Filed 10/13/2009 Page 4 of 87 1 1. Lead Plaintiff, Roland Pomfret, brings this Consolidated Class Action 2 Complaint for Violations of the Federal Securities Laws (the "Complaint") 3 individually and on behalf of all other purchasers of the securities of Bidz.com , 4 Inc. ("Bidz" or "Company") between July 31, 2007 and November 10, 2008, 5 inclusive (the "Class Period"). Such purchasers, along with Plaintiff, are 6 collectively referred to herein as the "Class." This Complaint is brought against 7 Bidz, the Company's President, Chief Executive Officer, and Chairman of the 8 Board of Directors, David Zinberg, and the Chief Financial Officer and director 9 Lawrence Y. Kong (collectively, with the Company, "Defendants"). 10 2. This Complaint is alleged upon personal knowledge as to Plaintiff's 11 own acts, and upon information and belief as to all other matters, based upon 12 Plaintiff's counsel's investigation, including review of Bidz's public filings with 13 the United States Securities and Exchange Commission ("SEC"); conference calls; 14 wire and press releases published by and regarding Bidz; securities analysts' 15 reports and advisories; information available in the media and on the Internet; and 16 interviews with at least fifteen knowledgeable persons ("CW(s)"), including 17 former Bidz employees, who held positions that provided them with personal 18 access to the information which they reported. Additional facts supporting the 19 allegations contained herein are known only to the Defendants or are exclusively 20 within their control. Plaintiff believes that substantial additional evidentiary 21 support exists for the allegations set forth in this Complaint that will be revealed 22 after a reasonable opportunity for discovery. 23 JURISDICTION AND VENUE 24 3. The claims asserted herein arise under and pursuant to Sections 10(b) 25 and 20(a) of the Exchange Act, (15 U.S.C. §§ 78j(b) and 78t(a)), and Rule lOb-S 26 promulgated thereunder (17 C.F.R. § 240.1Ob-5). 27 1 28 CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS I DOCS\490115v1 2:09-cv-0321 6-CBM-E Document 34 Filed 10/13/2009 Page 5 of 87 1 4. This Court has jurisdiction over the subject matter of this action 2 pursuant to Section 27 of the Exchange Act (15 U.S.C. § 78aa) and 28 U.S.C. 3 § 1331. 4 5. Venue is proper in this District pursuant to Section 27 of the 5 Exchange Act, 15 U.S.C. § 78aa and 28 U.S.C. § 1391(b). Many of the acts and 6 transactions alleged herein, including the preparation and dissemination of 7 materially false and misleading information, occurred in substantial part in this 8 District. Additionally, Bidz's principal executive offices are located within this 9 District. 10 6. In connection with the acts, conduct and other wrongs alleged in this 11 Complaint, Defendants, directly or indirectly, used the means and instrumentalities 12 of interstate commerce, including but not limited to, the United States mails, 13 interstate telephone communications and the facilities of the national securities 14 exchange. 15 PARTIES 16 7. Plaintiff Roland Pomfret ("Plaintiff') purchased Bidz securities, in 17 reliance on Defendants' false and misleading statements and omissions of material 18 facts and/or the integrity of the market for Bidz securities, at artificially inflated 19 prices during the Class Period and suffered economic loss and damages when the 20 truth about Bidz that was misrepresented and omitted during the Class Period was 21 revealed. The Plaintiff's Certification of Roland Pomfret containing a detailed list 22 of his transactions in Bidz securities during the Class Period is attached hereto as 23 Exhibit A. 24 8. Defendant Bidz is a Delaware corporation with its principal executive 25 offices located at 3562 Eastham Drive, Culver City, California 90232. Bidz 26 characterizes itself as a "leading online retailer of jewelry, featuring a live auction 27 format." Bidz offers its products through a continuous live format, featuring a $1 2 28 CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS I DOCS\490115v1 2:09-cv-0321 6-CBM-E Document 34 Filed 10/13/2009 Page 6 of 87 1 minimum opening bid, and a unique 15-second auction extension period that 2 allows the auctions to continue until all bids are received. The majority of the 3 auctions are short-term, often lasting less than one hour. Their product inventory 4 includes gold, platinum, and silver jewelry set with diamonds, rubies, emeralds, 5 sapphires, and other precious and semi-precious stones, watches, and accessories. 6 According to Bidz, it is the "second largest online retailer of jewelry." Bidz's 7 stock is quoted on the NASDAQ Stock Market LLC under the symbol "BIDZ." 8 NASDAQ is a well-developed, efficient market for securities. 9 9. Defendant David Zinberg ("Zinberg") was, at all relevant times, the 10 Company's President, Chief Executive
Recommended publications
  • 1 BIDDER BEWARE TOWARD a FRAUD-FREE MARKETPLACE – BEST PRACTICES for the ONLINE AUCTION INDUSTRY Paula Selis Anita Ramasastry
    BIDDER BEWARE TOWARD A FRAUD-FREE MARKETPLACE – BEST PRACTICES FOR THE ONLINE AUCTION INDUSTRY Paula Selis* Anita Ramasastry** Charles S. Wright*** Abstract: This report presents to businesses, consumers and government officials (including law enforcement) a “menu of options” for combating fraud in the online auction industry. By directly interviewing several major online auction sites and cataloging the features of other sites, the Washington Attorney General’s Office, in conjunction with the Center for Law Commerce and Technology at the University of Washington Law School, has attempted to identify a series of “best practices” in the online auction industry. The results of these interviews as well as findings from investigation of current practices on the Web are presented here. By identifying the most successful, innovative, and feasible practices, this report seeks to maximize the reach of industry solutions and thereby promote industry-wide self-regulation. Standardization is a powerful tool for eradicating fraud across the industry. However, divergent business models and differing consumer needs mean that there is no one size that fits all models. This report presents a pro-active collaboration between enforcement agencies, industry, and academia. It also suggests a menu of best practices from which users might choose to suit their needs, and invites comment, critique and improvement upon those practices. INTRODUCTION Produced by the Washington State Attorney General’s office and the Center for Law Commerce and Technology at the University of Washington Law School, this report surveys the current range of responses to the problem of online auction fraud. This report presents the results of that survey in the form of a menu of options for businesses and consumers.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Business Ethics
    Business Ethics Business ethics is a form of the art of applied ethics that examines ethical rules and principles within a commercial context, the various moral or ethical problems that can arise in a business setting and any special duties or obligations that apply to persons who are engaged in commerce. Business ethics can be both a normative and a descriptive discipline. As a corporate practice and a career specialization, the field is primarily normative. In academia descriptive approaches are also taken. The range and quantity of business ethical issues reflects the degree to which business is perceived to be at odds with non-economic social values. Historically, interest in business ethics accelerated dramatically during the 1980s and 1990s, both within major corporations and within academia. For example, today most major corporate websites lay emphasis on commitment to promoting non-economic social values under a variety of headings (e.g. ethics codes, social responsibility charters). In some cases, corporations have redefined their core values in the light of business ethical considerations (e.g. BP's "beyond petroleum" environmental tilt). Overview of Issues in Business Ethics General Business Ethics © 2014 All Star Training, Inc. Page 1 This part of business ethics overlaps with the philosophy of business, one of the aims of which is to determine the fundamental purposes of a company. If a company's main purpose is to maximize the returns to its shareholders, then it could be seen as unethical for a company to consider the interests and rights of anyone else. Corporate social responsibility or CSR: an umbrella term under which the ethical rights and duties existing between companies and society is debated.
    [Show full text]
  • Eric L. Carlson
    CARLSON.DOC 1/5/2007 11:04:55 AM PHISHING FOR ELDERLY VICTIMS: AS THE ELDERLY MIGRATE TO THE INTERNET FRAUDULENT SCHEMES TARGETING THEM FOLLOW Eric L. Carlson Internet usage is no longer limited to a young, tech-savvy subset of the population. As elderly people use the Internet in increasing numbers, the con artists who prey on them adapt their tactics accordingly. In this note, Eric Carlson explains why the elderly are especially susceptible to Internet fraud. He describes three fraudulent schemes regularly perpetrated against the elderly and the devastating effects they have on older Americans. While relevant legislation, prosecution of offenders, and education of the elderly all help to alleviate the occurrence of fraud, the problem persists. Mr. Carlson concludes that legislation and enforcement measures are helpful but insufficient to address the problem, and that society—including neighbors, family, and especially young, tech-savvy friends—has an obligation to help elderly people avoid falling victim to fraudulent Internet schemes. Eric L. Carlson is Notes Editor 2006–2007, Member 2005–2006, The Elder Law Journal; J.D. 2007, University of Illinois, Urbana-Champaign; B.S. 2004, University of Illinois, Urbana-Champaign, College of Engineering. The author would like to thank his parents, Stephen and Joanne Carlson, for their con- tinued support and encouragement. Go Illini! CARLSON.DOC 1/5/2007 11:04:55 AM 424 The Elder Law Journal VOLUME 14 I. Introduction To a large degree, the Internet is synonymous with a hip, tech-savvy, and young demographic. Heavily influenced by pop culture and the mainstream media, the modern-day Internet is typically characterized by young entrepreneurs, teenage hackers, bloggers, social networking Web sites, online gaming, and file- sharing.
    [Show full text]
  • Broker-Dealers As Catalysts for Reform, 16 B.C.L
    Boston College Law Review Volume 16 Article 2 Issue 3 Special Issue The Securities Laws: A Prognosis 3-1-1975 Regulating Discretionary Management: Broker- Dealers as Catalysts for Reform Harvey E. Bines Follow this and additional works at: http://lawdigitalcommons.bc.edu/bclr Part of the Securities Law Commons Recommended Citation Harvey E. Bines, Regulating Discretionary Management: Broker-Dealers as Catalysts for Reform, 16 B.C.L. Rev. 347 (1975), http://lawdigitalcommons.bc.edu/bclr/vol16/iss3/2 This Article is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. REGULATING DISCRETIONARY MANAGEMENT: BROKER-DEALERS AS CATALYSTS FOR REFORM HARVEY E. BINES * Over the last decade, there has been a remarkable increase in the number of broker-dealers offering or promoting discretionary management services.' In "discretionary" accounts, authority is granted an investment manager to make investment decisions and execute them for the benefit of a client without the obligation of consulting with, or obtaining prior approval from, the client. 2 An increasing number of houses are offering discretionary man- agement services directly or through affiliates, and they are actively soliciting clients to turn their accounts over for expert management. Other broker-dealers, not offering discretionary management ser- vices themselves or through affiliates, are referring customers to investment advisers who in turn pay compensation for the referrals or rely on referring broker-dealers for executions and custody of client accounts.
    [Show full text]
  • Perceptions of Online Fraud and the Impact on the Countermeasures for the Control of Online Fraud in Saudi Arabian Financial Institutions
    Perceptions of online fraud and the impact on the countermeasures for the control of online fraud in Saudi Arabian financial institutions A thesis submitted for the degree of Doctor of Philosophy By FAISAL ALANEZI 2015 College of Engineering Design and Physical Sciences Department of Computer Science Brunel University ABSTRACT This study addresses the impact of countermeasures in the control and prevention of online fraud in Saudi Arabia and the influence of the environmental context. Combatting online fraud is facilitated when the public is fully educated and is aware of its types and of the prevention methods available. People are reliant on the Internet; the possibility of being breached by hackers and fraudsters is growing, especially as socialising, online shopping and banking are carried out through personal computers or mobile devices. Online fraud has been described as an epidemic that has spread to most online activities. Its prevalence has been noted to be in regions where there is high adoption of e-commerce, and, along with it, large online financial transactions. The argument is therefore the measures taken are either are inadequate or have failed to effectively address all the issues because of the organisational and environmental context of the country. This research aims to examine online fraud perceptions and the countermeasures designed and used by financial institutions in Saudi Arabia to control and prevent online fraud in its environmental context, to examine the effectiveness/impact of the countermeasures and to examine the factors that may affect/influence the impact of the countermeasures. The qualitative method approach was chosen to ensure balanced coverage of the subject matter.
    [Show full text]
  • CRIMINAL JUSTICE in AMERICA FIFTH EDITION Cja Unit1a:Layout 1 7/10/2012 2:10 PM Page 1
    CRIMINAL JUSTICE IN AMERICA FIFTH EDITION cja_unit1a:Layout 1 7/10/2012 2:10 PM Page 1 CRIMINAL JUSTICE IN AMERICA FIFTH EDITION Developed by Marshall Croddy Bill Hayes cja_unit1a:Layout 1 7/10/2012 2:10 PM Page 2 601 South Kingsley Drive T. Warren Jackson, Chair Los Angeles, California 90005 Marshall P. Horowitz, Chair, (213) 487- 5590 Publications Committee www.crf-usa.org Jonathan Estrin, President Marshall Croddy, Vice President Developed by Subject Matter Consultants Marshall Croddy and Bill Hayes (Various Editions) Richard Chrystie, Deputy District Attorney, Board Reviewers Los Angeles County Marshall P. Horowitz, Lisa Rockwell, Val Cole, Deputy District Attorney, Patrick Rogan, K. Eugene Shutler, Los Angeles County Douglas Thompson, Lois Thompson Star French, Deputy Probation Officer, Editor Los Angeles County Bill Hayes John Hud, Criminal Defense Attorney, Bozeman, Montana Contributing Writers (Various Editions) Daniel E. Lewis, Attorney, Los Angeles Bill Hayes, Marshall Croddy, Todd Clark, Julia Rider, Luce, Forward, Hill, Jeffer & Teri Engler, Lucy Eisenberg, Damon Huss, Mangels Sandy Kanengiser, Carlton Martz, Betsy Devallis Rutledge, Special Counsel to the Salzman, Eden Kusmiersky, Coral Suter, District Attorney, Los Angeles County Charles Tremper, Michelle Ng, Roy Kim, Richard Simonian, Superintendent, C.K. Shruti Modi, Anjelica Sarmiento, Sophia Khan, Wakefield School, Fresno County Probation Marianna Muratova Department Researchers Captain Robert Taylor, Commanding Officer, (Various Editions) Juvenile Division, Los Angeles Police Rick Bhasin, Luke Delgado, and Michael Sokolson Department Kerry White, Head Deputy District Attorney, Production Juvenile Division, Los Angeles County Andrew Costly, Designer Library of Congress Cataloging-in-Publication Data Criminal justice in America / developed by Marshall Croddy and Bill Hayes ; edited by Bill Hayes ; written by Bill Hayes ..
    [Show full text]
  • AN INTRODUCTION to ART FRAUD by Marc Carrier
    AN INTRODUCTION TO ART FRAUD by Marc Carrier Online auctions: art fraud for the masses… Internet forgeries and flimflams. The work by American abstract painter Richard Diebenkorn attracted lots of attention on eBay. The bids opened at .30 cents and soon started soaring. The price reached four f igures, then six figures, finally selling to a buyer in the Netherlands for $135,805 USD. The painting was a fake. And so were most of the bids. A U.S. court sentenced Kenneth Fetterman to almost four years in jail for this crime. Fetterman and his accomplices posted bogus paintings on eBay—the forged works of Alberto Giacometti, Maurice Utrillo, Edward Hopper, and others—using a swindle called shill bidding to drive up the prices. It’s an easy trick. One or more individuals register to an auction site under a variety of anonymous profiles, and compete with real buyers by posting phony bids. There’s nothing new about this. It is a ploy that has been around since the earliest days of bricks and mortar auction houses. The Internet just makes it easier. Too easy. Auctions now reach far beyond the carpeted salons of Christie’s and Sotheby’s thanks to the Internet, resulting in a widespread democratization of art fraud. Anyone with a computer and a modem is now vulnerable to online deceit. And the problem appears to be growing. According to the Internet Fraud Complaint Center, a partnership between the FBI and the National White Collar Crime Center, almost half of all reported crimes concern online auction sites.
    [Show full text]
  • Litigation Trusts in Chapter 11 Bankruptcies: a Proposal to Ensure Adequate Representation to Creditors Represented by Bankruptcy Trustees Douglas R
    Brooklyn Law Review Volume 79 | Issue 4 Article 6 2014 Litigation Trusts in Chapter 11 Bankruptcies: A Proposal to Ensure Adequate Representation to Creditors Represented by Bankruptcy Trustees Douglas R. Keeton Follow this and additional works at: https://brooklynworks.brooklaw.edu/blr Recommended Citation Douglas R. Keeton, Litigation Trusts in Chapter 11 Bankruptcies: A Proposal to Ensure Adequate Representation to Creditors Represented by Bankruptcy Trustees, 79 Brook. L. Rev. (2014). Available at: https://brooklynworks.brooklaw.edu/blr/vol79/iss4/6 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Law Review by an authorized editor of BrooklynWorks. NOTES Litigation Trusts in Chapter 11 Bankruptcies A PROPOSAL TO ENSURE ADEQUATE REPRESENTATION TO CREDITORS REPRESENTED BY BANKRUPTCY TRUSTEES INTRODUCTION On December 10, 2008, Bernard L. Madoff’s Ponzi scheme1 collapsed.2 On December 15, 2008, the Securities Investors Protection Corporation (SIPC)3 obtained an order pursuant to the Securities Investors Protection Act4 (SIPA) placing Bernard L. Madoff Investment Securities, LLC (BLMIS) under the protection of SIPC and appointing Irving Picard as trustee to liquidate the assets of BLMIS for the benefit of its customers.5 In furtherance of his mission, Picard filed four actions in the United States Bankruptcy Court for 1 “A ‘Ponzi scheme’ is [a] fraudulent investment scheme in which money contributed by later investors generates artificially high dividends for the original investors, whose example attracts even larger investments.” Official Comm. of Unsecured Creditors v. R.F. Lafferty & Co., 267 F.3d 340, 343 n.1 (3d Cir.
    [Show full text]
  • Auction Fraud Detection Using SVM-Based Supervised Learning
    AUCTION SHILL DETECTION FRAMEWORK BASED ON SVM A Thesis Submitted to the Faculty of Graduate Studies and Research In Partial Fulfillment of the Requirements For the Degree of Master of Science in Computer Science University of Regina By Swati Ganguly Regina, Saskatchewan December, 2016 Copyright 2016: Swati Ganguly UNIVERSITY OF REGINA FACULTY OF GRADUATE STUDIES AND RESEARCH SUPERVISORY AND EXAMINING COMMITTEE Swati Ganguly, candidate for the degree of Master of Science in Computer Science, has presented a thesis titled, Auction Shill Detection Framework Based on SWM, in an oral examination held on December 9, 2016. The following committee members have found the thesis acceptable in form and content, and that the candidate demonstrated satisfactory knowledge of the subject material. External Examiner: Dr. Eman Almehdawe, Faculty of Business Administration Supervisor: Dr. Samira Sadaoui, Department of Computer Science Committee Member: Dr. Malek Mouhoub, Department of Computer Science Committee Member: Dr. Lisa Fan, Department of Computer Science Chair of Defense: Dr. Yang Zhao, Department of Mathematcis and Statistics ABSTRACT Online auctioning has attracted serious in-auction fraud, such as shill bidding, given the huge amount of money involved and the anonymity of users. Due to the fact that shill bidding is difficult to detect as well as to prove, very few researchers have been successful in designing online shill detection systems that can be adopted by auction sites. We introduce an efficient SVM-based two-phased In-Auction Fraud Detection (IAFD) model. This supervised model is first trained offline for identifying ‘Normal’ and ‘Suspicious’ bidders. For this process, we identify a collection of the most relevant fraud classification features rather than uncertain or general features, like feedback ratings.
    [Show full text]
  • Detection of Auction Fraud in Commercial Sites Farzana Anowar1 and Samira Sadaoui2
    Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at ISSN 0718–1876 Electronic Version www.jtaer.com VOL 15 / ISSUE 1 / JANUARY 2020 / 81-98 DOI: 10.4067/S0718-18762020000100107 © 2020 Universidad de Talca - Chile Detection of Auction Fraud in Commercial Sites Farzana Anowar1 and Samira Sadaoui2 1 University of Regina, Department of Computer Science, Regina, Canada, [email protected] 2 University of Regina, Department of Computer Science, Regina, Canada, [email protected] Received 13 October 2018; received in revised form 12 December 2018; accepted 7 January 2019 Abstract Online auctions have become one of the most convenient ways to commit fraud due to a large amount of money being traded every day. Shill bidding is the predominant form of auction fraud, and it is also the most difficult to detect because it so closely resembles normal bidding behavior. Furthermore, shill bidding does not leave behind any apparent evidence, and it is relatively easy to use to cheat innocent buyers. Our goal is to develop a classification model that is capable of efficiently differentiating between legitimate bidders and shill bidders. For our study, we employ an actual training dataset, but the data are unlabeled. First, we properly label the shill bidding samples by combining a robust hierarchical clustering technique and a semi-automated labeling approach. Since shill bidding datasets are imbalanced, we assess advanced over-sampling, under-sampling and hybrid-sampling methods and compare their performances based on several classification algorithms. The optimal shill bidding classifier displays high detection and low misclassification rates of fraudulent activities.
    [Show full text]