Skip to main content

The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7397)

Abstract

A High Yield Investment Program (HYIP) is an online Ponzi scheme, a financial fraud that pays outrageous levels of interest using money from new investors. We call this fraud ‘postmodern’ in that sophisticated investors understand the fraud, but hope to profit by joining early. These investors support ‘aggregators’ – reputation websites that track the status of HYIPs. We examine 9 months of aggregator data and show that there is no evidence of collusion between different aggregators. We use their data to measure the time until HYIPs collapse, finding – perhaps unsurprisingly – that longer lifetimes are associated with lower interest payments and longer mandatory investment terms. We look at the role of digital currencies in supporting HYIPs, finding that a handful of systems dominate. Finally, we estimate that this type of criminality is turning over at least $6 million/month and set out ways in which it might be disrupted.

Keywords

  • Interest Rate
  • Survival Function
  • Investment Program
  • Investment Term
  • Email Spam

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Simpson, E.H.: Measurement of diversity. Nature 163, 688 (1949)

    CrossRef  MATH  Google Scholar 

  2. Kaplan, E., Meier, P.: Nonparametric estimation from incomplete observations. Journal of the American Statistical Association 53, 457–481 (1958)

    CrossRef  MathSciNet  MATH  Google Scholar 

  3. Lorenzini, M.: Strictpay scam: Thoughts before strictpay shutdown. HYIP News (June 2010), http://www.hyipnews.com/news/17190/STRICTPAY-SCAM-THOUGHTS-BEFORE-STRICTPAY-SHUTDOWN/

  4. Zetter, K.: Bullion and bandits: The improbable rise and fall of e-gold. Wired (June 2009), http://www.wired.com/threatlevel/2009/06/e-gold/

  5. Kanich, C., Weaver, N., McCoy, D., Halvorson, T., Kreibich, C., Levchenko, K., Paxson, V., Voelker, G.M., Savage, S.: Show me the money: Characterizing spam-advertised revenue. In: Proceedings of USENIX Security 2011, San Francisco, CA (August 2011)

    Google Scholar 

  6. Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G., Paxson, V., Savage, S.: Spamalytics: An empirical analysis of spam marketing conversion. In: Conference on Computer and Communications Security (CCS), Alexandria, VA (October 2008)

    Google Scholar 

  7. Leontiadis, N., Moore, T., Christin, N.: Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In: Proceedings of USENIX Security 2011, San Francisco, CA (August 2011)

    Google Scholar 

  8. Commission, C.F.E.: Press Release PR6074-11: CFTC charges Jeffery A. Lowrance and his company, First Capital Savings and Loan, with operating a million dollar foreign currency Ponzi scheme (July 2011), http://www.cftc.gov/PressRoom/PressReleases/pr6074-11.html

  9. Moore, T., Clayton, R., Anderson, R.: The economics of online crime. Journal of Economic Perspectives 23(3), 3–20 (2009)

    CrossRef  Google Scholar 

  10. Cova, M., Leita, C., Thonnard, O., Keromytis, A.D., Dacier, M.: An Analysis of Rogue AV Campaigns. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 442–463. Springer, Heidelberg (2010)

    CrossRef  Google Scholar 

  11. Stone-Gross, B., Abman, R., Kemmerer, R.A., Kruegel, C., Steigerwald, D.G., Vigna, G.: The underground economy of fake antivirus software. In: 10th Workshop on the Economics of Information Security, Fairfax, VA (June 2011)

    Google Scholar 

  12. Christin, N., Yanagihara, S., Kamataki, K.: Dissecting one click frauds. In: ACM Conference on Computer and Communications Security (CCS), Chicago, IL, pp. 15–26 (October 2010)

    Google Scholar 

  13. Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54, 70–75 (2011)

    CrossRef  Google Scholar 

  14. Birch, D.G.W., McEvoy, N.A.: Electronic Cash - Technology will Denationalise Money. In: Hirschfeld, R. (ed.) FC 1997. LNCS, vol. 1318, pp. 95–108. Springer, Heidelberg (1997)

    CrossRef  Google Scholar 

  15. Chaum, D.: Achieving electronic privacy. Scientific American, 96–101 (August 1992)

    Google Scholar 

  16. Wayner, P.C.: Money Laundering: Past, Present and Future. In: Hirschfeld, R. (ed.) FC 1997. LNCS, vol. 1318, pp. 301–306. Springer, Heidelberg (1997)

    CrossRef  Google Scholar 

  17. Anderson, R.: Closing the phishing hole: Fraud, risk and nonbanks. In: Federal Reserve Bank of Kansas City – Payment System Research Conferences (2007)

    Google Scholar 

  18. Moore, T., Clayton, R.: Evaluating the Wisdom of Crowds in Assessing Phishing Websites. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 16–30. Springer, Heidelberg (2008)

    CrossRef  Google Scholar 

  19. Chia, P.H., Knapskog, S.J.: Re-evaluating the Wisdom of Crowds in Assessing Web Security. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 299–314. Springer, Heidelberg (2012)

    CrossRef  Google Scholar 

  20. Levchenko, K., Chachra, N., Enright, B., Felegyhazi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Pitsillidis, A., Weaver, N., Paxson, V., Voelker, G., Savage, S.: Click trajectories: End-to-end analysis of the spam value chain. In: IEEE Symposium on Security and Privacy, Oakland, CA, pp. 431–446 (May 2011)

    Google Scholar 

  21. Clayton, R.: How much did shutting down McColo help? In: Sixth Conference on Email and Antispam, CEAS (July 2009)

    Google Scholar 

  22. Liu, H., Levchenko, K., Felegyhazi, M., Kreibich, C., Maier, G., Voelker, G.M., Savage, S.: On the effects of registrar-level intervention. In: USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA (March 2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moore, T., Han, J., Clayton, R. (2012). The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs. In: Keromytis, A.D. (eds) Financial Cryptography and Data Security. FC 2012. Lecture Notes in Computer Science, vol 7397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32946-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32946-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32945-6

  • Online ISBN: 978-3-642-32946-3

  • eBook Packages: Computer ScienceComputer Science (R0)