Skip to main content
Log in

Twisting trust: social networks, due diligence, and loss of capital in a Ponzi scheme

  • Published:
Crime, Law and Social Change Aims and scope Submit manuscript

Abstract

This paper examines a pre-planned fraud which ran undetected for more than five years and deceived 2285 investors for $240 million. We seek to uncover the effects of trust in social ties and conducting due diligence on 1) an investor’s initial amount of investment and 2) their overall loss of capital. Using data from a survey of 559 victims, we conduct two linear regression models to test for effects on investors’ amount of initial investments and their total net loss. By using two dependent variables, we examine effects of social ties and performing due diligence at the beginning stage and end stage of a Ponzi scheme. Performing due diligence and relying on information provided by industry professionals increased initial investments, while having performed due diligence also increased investors’ loss of capital at the end of the fraud, suggesting both social ties and due diligence contributed to fraud victimization. The findings are interpreted within the context of a particularly sophisticated fraud where document falsification was almost impossible to detect, contributing to a false sense of security among victims.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. It was legally determined by the British Columbia Supreme Court to be a pre-planned fraud. Evidence of Eron’s actions also provide evidence of a pre-planned fraud: 1) Eron did not adequately investigate projects before funding them and, 2) Slobogian and Biller continued to advance funds to projects that they knew were losing money and exceeded their worth during the time Eron was formed, These actions should take place before securing money from investors for any legitimate mortgage brokering business.

  2. The Santa investment fraud was a Ponzi scheme that lasted over ten years and targeted military officers in Greenland from 1986 to 1999.

  3. Specific charges include: 1) overstating the value of mortgaged properties, 2) overstating extent to which mortgaged properties had been developed, 3) understated the degree of risk in the mortgages, 4) promised investors unrealistic rates of return (15 to 20%), 5) promised investors repayment in 6 to 12 months which could not be met without raising more funds, 6) did not fulfill guarantees to investors of repayment, 7) put investors into mortgages with lower priority and/or higher principal amounts than which the investors were told, 8) raised funds from investors for mortgages that exceeded the face value of said mortgages, 9) spent investors funds in ways that were different from their intended purpose, without advising the investors, 10) used the funds of subsequent investors to make interest and principal payments to existing investors without their knowledge and, 11) failed to keep proper records of the funds raised from investors [30].

  4. Seven respondents from our network sample were removed from the study because they chose themselves as the person who influenced them to invest in Eron.

  5. A control variable for how respondents first heard about Eron was created. Respondents were asked “How did you first hear about Eron?” Respondents could select all that applied to their situation from eleven different options including: 1. Eron employee, 2. Financial broker, 3. Family or friend, 4. Business associate, 5. Hockey connection, 6. Eron seminar, 7. Newspaper advertisement, 8. Newspaper article or column, 9. Mail solicitation, 10. Television advertisement and 11. Other These 11 options were indexed into two distinct variables, first heard about Eron through Personal sources, coded as an index of respondents who selected options 1–5, (M = .9733, range = 0–4) and first heard about Eron through impersonal sources, coded as an index of respondents who selected choices 6–10 (M = .6089, range = 0–4). Both variables were not significant in either model. Initial Investment model (R2 = .198; F = 3.835; p < .001); personal sources: B = .119, p = .206; impersonal sources: B = .011, p = .894. Net Loss model (R2 = .447; F = 16.469; p < .001); personal sources: B = .036, p = .702; impersonal sources: B = .037, p = .667.

  6. We ran the same model (R 2 = .162, F = 2.273, p < .05) on our non-network sample (n = 222) with the exception of including the social tie indicators and found no significant effects on initial investment from due diligence, B =

    −.002, p = .734; Personal sources, B = −.019, p = .081; Impersonal sources, B = −.004, p = .699..

  7. We ran the same model (R 2 = .454, F = 10.569, p < .001) on our non-network sample (n = 222) with the exception of including the social tie indicators and found no significant effects on net loss from due diligence, B =

    .008, p = .104; Personal sources, B = .002, p = .837; Impersonal sources, B = .003, p = .814.

  8. An important distinction must be made between our study and that of Baker and Faulkner’s [1]. The Fountain, Oil and Gas fraud examined by Baker and Faulkner is an intermediate fraud – a fraud that started off as a legitimate business but turned to fraudulent activity to sustain itself. Our study examines a pre-planned fraud which starts on the premise of fraudulent activity from the beginning of its existence. In the pre-planned fraud conducted by Eron, two factors may automatically be working against investors: (1) falsified documentation provided by Eron, contributing to the malfeasant effect of conducting due diligence, and (2) an overreliance on industry professionals, contributing to the negative effects of trust in making financial decisions.

References

  1. Baker, W. E., & Faulkner, R. R. (2004). Social networks and loss of capital. Social Networks, 26, 91–111.

    Article  Google Scholar 

  2. Buskens, V. (2002). Social networks and trust. Boston: Kluwer Academic Publishers.

    Google Scholar 

  3. DiMaggio, P., & Louch, H. (1998). Socially embedded consumer transactions: for what kinds of purchases do people most often use networks? American Sociological Review, 63, 619–637.

    Article  Google Scholar 

  4. Baker, W. E., & Faulkner, R. R. (2003). Diffusion of fraud: intermediate economic crime and investor dynamics. Criminology, 41, 1601–1634.

    Article  Google Scholar 

  5. Stolowy, H., Baker, R., Jeanjean, T., & Messner, M. (2011). Information and trust in financial decision making: insights from the Madoff case. Séminaire de recherche, Université de Manchester.

  6. Granovetter, M. (1985). Economic action and social structure: the problem of embeddedness. American Journal of Sociology, 91, 481–510.

    Article  Google Scholar 

  7. Pressman, S. (1998). On financial frauds and their causes: investor overconfidence. American Journal of Economics and Sociology, 57(4), 405–421.

    Article  Google Scholar 

  8. Rosen, A., & Rosen, M. (2010). Swindlers: cons and cheats and how to protect your investments from them. Toronto: Madison Press Books.

    Google Scholar 

  9. Pack, H. (2002). Due diligence. In G. Picot (Ed.), Handbook of international mergers and acquisitions. New York: Pallgrave MacMillan.

    Google Scholar 

  10. Burt, R. S., & Knez, M. (1995). Kinds of third-party effects on trust. Rationality and Society, 7, 255–292.

    Article  Google Scholar 

  11. Comet, C. (2011). Anatomy of a fraud: trust and social networks. Bulletin of Methodological Sociology, 110, 45–57.

    Article  Google Scholar 

  12. Zucker, L. G. (1986). Production of trust: institutional sources of economic structure, 1840 – 1920. Research in Organizational Behavior, 8, 53–111.

    Google Scholar 

  13. Arrow, K. (1970). Political and economic evaluation of social effects and externalities. In J. Margolis (Ed.), The analysis of public output (pp. 1–30). New York: Columbia University Press.

    Google Scholar 

  14. Benson, M. L., & Simpson, S. S. (2009). White collar crime: an opportunity perspective. NY: Routledge.

    Book  Google Scholar 

  15. Blau, P. (1964). Exchange and power in social life. New York: Wiley.

    Google Scholar 

  16. Guiso, L. (2009). A trust-driven financial crisis. Implications for the future of financial markets. European University Institute: EIEF & CEPR. Retrieved from http://www.eief.it/files/2012/09/wp-06-a-trust-driven-financial-crisis-implications-for-the-future-of-financial-markets.pdf.

  17. Kramer, R. M. (2009). Rethinking trust. Harvard Business Review. Retrieved from http://web.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=ae800865-56d1-485b-b2c7-8f8950bb15f5%40sessionmgr14&vid=2&hid=14.

  18. Parsons, T. (1951). The social system. Glencoe: Free Press.

    Google Scholar 

  19. Shapiro, S. P. (1990). Collaring the crime, not the criminal: reconsidering the concept of white-collar crime. American Sociological Review, 55(3), 346–365.

    Article  Google Scholar 

  20. Nash, R., Bouchard, M., & Malm, M. (2013). Investing in people: the role of social networks in the diffusion of a large-scale fraud. Social Networks, 35(4), 686–698.

    Article  Google Scholar 

  21. Hill, C. A., & O’Hara, E. A. (2006). A cognitive theory of trust. Washington University Law Review, 84, 1717–1796.

    Google Scholar 

  22. Burt, R. S. (2005). Brokerage and closure: an introduction to social capital. UK: Oxford University Press.

    Google Scholar 

  23. Castelfranchi, C., & Falcone, R. (2001). Socio-cognitive theory of trust. National Research Council. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.199.259&rep=rep1&type=pdf.

  24. Coleman, J. (1990). The foundations of social theory. Cambridge: Harvard University Press.

    Google Scholar 

  25. Titus, R. M., Heinzelman, F., & Boyle, J. M. (1995). Victimization of persons by fraud. Crime and Delinquency, 41(1), 54–72.

    Article  Google Scholar 

  26. Couch, L., Adams, J., & Jones, W. (1996). The assessment of trust orientation. Journal of Personality Assessment, 67(2), 305–323.

    Article  Google Scholar 

  27. Grebey, J. (2012). Operations due diligence: an M&a guide for investors and business. New York: McGraw-Hill Professional.

    Google Scholar 

  28. Baranick, D., & Quraishi, S. (1999). Performing financial due diligence associated with commercial mortgage securitizations. In F. Fabozzi & D. Jacob (Eds.), Commercial mortgage-backed securities (pp. 397–415). New Hope: Wiley Publication.

    Google Scholar 

  29. Van de Bunt, H. (2010). Walls of secrecy and silence: the Madoff case and cartel in the construction industry. Criminology and Public Policy, 9(3), 435–450.

    Article  Google Scholar 

  30. Eron Mortgage Corporation et al. (1999). (Re). LNBCSC 91. Retrieved from http://www.bcsc.bc.ca/Enforcement/Decisions/ERON_MORTGAGE_CORPORATION,_et__al___Decision_/. Accessed 2 Sept 2017.

  31. CBC News. (2005). Eron mortgage VP pleads guilty to fraud, theft charges. Retrieved from http://www.cbc.ca/news/business/story/2005/04/05/eron-050405.html.

  32. Eron Mortgage Corporation et al. (1997) (Re). SCBC A972569. Retrieved from http://www.bcsc.bc.ca/Enforcement/Decisions/ERON_MORTGAGE_CORPORATION,_et__al___Decision_(2)/. Accessed 2 Sept 2017.

  33. Boyd, N., Joy, N., Malm, A., Kinney, B., & McAllister Opinion Research. (2005). Eron mortgage study. Vancouver: British Columbia Security Commission Retrieved from http://www.investright.org/uploadedFiles/resources/studies_about_investors/Eron_Research_Study_with_content_page_links.pdf.

    Google Scholar 

  34. Deevy, M., & Beals, M. (2013). The scope of the problem: an overview of fraud prevalence measurement. Financial fraud research center. Retrieved from http://longevity3.stanford.edu/wp-content/uploads/2013/12/Scope-of-the-Problem-FINAL.pdf.

  35. Deevy, M., Lucich, S., & Beals, M. (2012). Scams, schemes & swindles: a review of consumer financial fraud Research Retrieved from http://fraudresearchcenter.org/wp-content/uploads/2012/11/Scams-Schemes-Swindles-FINAL_11.20.121.pdf.

  36. Stolowy, H., Messner, M., Jeanjean, T., & Baker, R. (2014). Construction of a trustworthy investment opportunity: insights from the Madoff fraud. Contemporary Accounting Research, 31(2), 354–397.

    Article  Google Scholar 

  37. McPherson, M., Smith-Lovin, L., & Cook, J. (2001). Birds of a feather: homophily in social networks. Annual Review of Sociology, 27, 415–444.

    Article  Google Scholar 

  38. Schoepfer, A., & Piquero, N. (2009). Studying correlates of fraud victimization and reporting. Journal of Criminal Justice, 37(2), 209–215.

    Article  Google Scholar 

  39. Holtfreter, K., Reisig, M., & Pratt, T. (2008). Low self-control, routine activities, and fraud victimization. Criminology, 189–220.

  40. Van Wyk, J., & Benson, M. (1997). Fraud victimization: risky business or just bad luck. American Journal of Criminal Justice, 21, 163–179.

    Article  Google Scholar 

  41. Dulebohn, J. (2002). An investigation of the determinants of investment risk behavior in employer-sponsored retirement plans. Journal of Management, 28(1), 3–26.

    Article  Google Scholar 

  42. Graham, J. W. (2012). Missing data: analysis and design. Statistics for Social and Behavioral Sciences. https://doi.org/10.1007/978-1-4614-4018-5_2.

  43. Langkamp, D. L., Lehman, A., & Lemeshow, S. (2010). Techniques for handling missing data in secondary analyses of large surveys. Academic Pediatrics, 10, 205–210.

    Article  Google Scholar 

  44. Pigott, T. D. (2001). A review of methods for missing data. Educational Research and Evaluation, 7(4), 353–383.

    Article  Google Scholar 

  45. Scheffer, J. (2002). Dealing with missing data. Research Letters in the Information and Mathematical Sciences, 3, 153–160.

    Google Scholar 

  46. Roberts, J. (2009). No one is perfect: the limits of transparency and an ethic for ‘intelligent’ accountability. Accounting, Organizations and Society, 34(8), 957–970.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rebecca Nash.

Appendix

Appendix

Table 5 Correlation Matrix

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nash, R., Bouchard, M. & Malm, A. Twisting trust: social networks, due diligence, and loss of capital in a Ponzi scheme. Crime Law Soc Change 69, 67–89 (2018). https://doi.org/10.1007/s10611-017-9706-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10611-017-9706-2

Navigation