Professional Documents
Culture Documents
A Crime Script Analysis of The Madoff Investment Scheme: John Hardy Peter Bell Douglas Allan
A Crime Script Analysis of The Madoff Investment Scheme: John Hardy Peter Bell Douglas Allan
https://doi.org/10.1057/s41300-019-00082-6
ORIGINAL ARTICLE
Abstract
The Madoff Investment Scheme was a long-term and large-scale fraud which
involved both an affinity fraud and a Ponzi scheme. Numerous studies have exam-
ined financial and legal aspects of the case, but relatively few have explored the case
from a criminological perspective. This study applies crime script analysis (CSA) to
the Madoff case in order to conceptualise the procedural elements of complex fraud
offences and to identify crime prevention opportunities for investigators and regula-
tory bodies. CSA identifies 12 steps in the offence, occurring in three phases which
create a relationship between earlier and later victims, with earlier victims providing
credibility to the scheme and later victims generating the resources to sustain it. The
study finds that crime prevention techniques which harden targets and extend guard-
ianship could reduce criminal opportunities for offenders and techniques which
strengthen formal surveillance and assist natural surveillance could control the capa-
bilities required to perpetrate similar offences.
* John Hardy
jhardy@ra.a.ca.e; drbell003@gmail.com
Peter Bell
p.bell@griffith.edu.au
Douglas Allan
doallan@csu.edu.au
1
Rabdan Academy, Dhafeer St, Post Box 114646, Abu Dhabi, United Arab Emirates
2
Griffith Asia Institute, Griffith University, Brisbane, Australia
3
Australian Graduate School of Policing and Security, Charles Sturt University, Canberra,
Australia
Vol:.(1234567890)
A crime script analysis of the Madoff Investment Scheme 69
Introduction
a specific community and which are often perpetrated by members of the targeted
community (Smith 2010; Fairfax 2003). The Madoff Investment Scheme is a nota-
ble case not only due to the scale, duration and value of the Ponzi scheme fraud but
also due to the immense social harm created by Madoff’s personal betrayals of his
victims, including close personal friends, vulnerable people and charitable organisa-
tions (USA v. Madoff 2009c). It is also a peculiar case because, unlike typical Ponzi
schemes which tend to be constrained by a limited supply of investors, Madoff’s
scheme was open-ended (Langevoort 2009). Although Madoff claimed that he ini-
tially believed that his scheme would be a short-term measure, he acknowledged that
the scheme was destined to collapse and that he fully expected to be caught and
prosecuted when it did (USA v. Madoff 2009a; USA v. Madoff 2009b).
When his scheme finally collapsed, Madoff made a deliberate attempt to insu-
late others from his crimes. Throughout the criminal and regulatory investigations,
and during his court proceedings and sentencing, Madoff claimed that he had acted
alone. Subsequent convictions in the Madoff case indicate that at least 14 others were
culpable. These accomplices included: Madoff’s younger brother, who had served as
a director at BLMIS and MSI (USA v. Madoff 2012a; USA v. Madoff 2012b); ten for-
mer BLMIS employees who had completed false trading documents; and facilitators
(Farah 2013), such as David Friehling, who assisted Madoff in filing SEC oversight
paperwork without proper compliance auditing (USA v. Friehling 2009), and David
Kugel, who backdated trades for Madoff accounts (Henriques 2011). How a rela-
tively small network of individuals was able to perpetrate such a large-scale fraud
over as long as 40 years remains a perplexing question. Being both an affinity fraud
and a Ponzi scheme, the Madoff scandal was a complex and sophisticated criminal
enterprise which can provide insight into detecting and reducing opportunities for
investment manager fraud (Dimmock and Gerken 2012) and adopting crime preven-
tion strategies for affinity frauds (Blois and Ryan 2013).
expected that offenders would see an opportunity for crime in situations they per-
ceive as being low risk and low effort but high reward (Cornish and Clarke 1986,
2008). Many contemporary mainstream theories and practical approaches to crime
prevention, such as routine activity theory (Cohen and Felson 1979) and situational
crime prevention, are predicated on the assumption of offender rationality.
Routine activity theory describes the circumstances that facilitate criminal oppor-
tunities. Cohen and Felson (1979) argue that offenders encounter opportunities in
the course of legitimate routine daily activities (on the way to work, while shop-
ping, etc.) and decide whether to commit crime if the perceived benefits of the act
outweigh the costs/risks. From a routine activity perspective (original formulation),
the opportunity is encountered through a spatio-temporal convergence of motivated
offenders and suitable targets in places where capable controllers are not present
(Cohen and Felson 1979; Felson 1986; Eck 1994). Here, controllers are anyone or
anything discouraging crime (Felson 1995). Controllers—guardians—may deter the
offender by simply being present at the scene of the crime or by active intervention.
Controllers—handlers—usually friends or family and so on—prevent crime by dis-
couraging the offender from committing crime by using their emotional connection,
while controllers—place managers—usually regulatory bodies, law enforcement or
compliance organisations and so on—prevent crime by implementing crime preven-
tion strategies at the places they manage (i.e. place managers) (Felson 1986; Hollis
et al. 2013; Tillyer and Eck 2011; Eck 1994).
Running counter to controllers, criminal facilitators promote crime by assist-
ing the offender and neutralising the prevention efforts of controllers (Clarke 1992,
1997). Facilitators could be anything from physical objects or parts of the physical
environment to chemical compounds and individuals who make crime more likely
(also known as social facilitators). Given the facilitators’ ability to ‘blunt crime pre-
vention’ (Clarke and Eck 2005: 66), understanding how they operate is critical to
counteracting their crime promotion activities. Recognising this, a growing body
of research focuses on examining the effect of facilitators in different contexts, for
example robbery (Gill 2001), drug trafficking (Natarajan et al. 1995), money laun-
dering (Europol 2015) and others.
Situational crime prevention builds on routine activity theory by suggesting that crime
can be prevented by modifying the environment to affect the offender’s perception of
risks/rewards associated with criminal activities (Cornish and Clarke 2003). Specifi-
cally, Cornish and Clarke (1987) argue that it is possible to reduce the likelihood of
crime by changing the environment to: (1) increase risk, (2) increase effort, (3) reduce
rewards, (4) remove excuses and (5) reduce provocations. For example, handlers (e.g.
friends and family) who remind potential offenders of the possible consequences of
their actions effectively discourage crime by negating excuses such as, ‘I did not know
A crime script analysis of the Madoff Investment Scheme 73
it was illegal to do it’. Cornish and Clarke (1987) suggest that, for a crime preven-
tion strategy to be effective, it must be crime-specific and underpinned by an in-depth
understanding of the crime commission process (see also Cornish and Clarke 1989;
Cornish 1994). To achieve the necessary depth of understanding of the phenomenon,
Cornish recommends that a CSA be undertaken as a first step in developing effective
situational crime prevention strategies.
Vakhitova and Bell (2018) noted Crime scripts were originally proposed by Cornish
(1994) as a way of unpacking the crime commission process and identifying the poten-
tial points of intervention for crime prevention. It has been argued that the concept of
crime scripts originated from the cognitive sciences, where they were originally con-
ceptualised as ‘hypothesized knowledge structures, or schemata, considered to organize
our knowledge of people and events’ (Cornish 1994: 157–158). A behavioural script in
the context of the crime commission process is simply a sequence of steps necessary
to commit a specific offence. It includes the actions involved in preparing, executing
and completing the offence. Crime scripts are seeded in the underlying assumption that
behaviour—in this specific case, criminal behaviour—is made routine:
… although each individual offense will have its unique characteristics, any one
class of offending will have sufficient elements in common to allow … [for some]
generalization, and thus facilitate the kind of preventive intervention that might
be applied to the whole class of offending rather than treating each offense as [an]
individual incident. (Hancock and Laycock 2010: 173–174)
To assist in developing crime scripts, Cornish (1994) produced a set of guidelines
around the notion of the universal script—a standardised sequence of the stages of the
crime commission process. The universal script involves preparation, entry, precon-
dition, instrumental precondition, instrumental initiation, instrumental actualisation,
doing, post-condition and exit scenes (Cornish 1994). Working within this procedural
analysis framework, crime scripts have been developed for a range of crimes, includ-
ing the operation of clandestine drug labs (Chiu et al. 2011), public sector corruption
(Rowe et al. 2013), online trading of stolen data (Hutchings and Holt 2014), transna-
tional illegal markets in endangered species (Moreto and Clarke 2014), active shooter
events (Osborne and Capellan 2015), jihadist foreign fighter operations (de Bie et al.
2015) and occupational pharmaceutical counterfeiting schemes (Kennedy et al. 2016)
to name a few. CSA is especially suited to analysing sophisticated fraud offences, such
as complex Ponzi schemes, with their array of supporting activities, individuals and
resources.
74 J. Hardy et al.
Methodology
Data
Clarke and Eck (2005) suggest investigative reports are a good source of infor-
mation regarding criminal systems and processes. As such, in order to under-
stand the complex structure and process underpinning the Madoff Ponzi scheme,
the researchers analysed more than 97 scholarly peer-reviewed articles, 72 sworn
Affidavits, 61 interview transcripts provided by the SEC and 10 New York Dis-
trict Court transcripts relating to the trial and subsequent conviction of Madoff
and nine other co-offenders made available online by the US Department of Jus-
tice and the SEC. All analysed documents are available via open-access online
from the US Department of Justice and scholarly databases. The list of specific
affidavits and interviews referred to in this paper can be found in Appendix A. It
should be noted that the researchers considered the validity of the witness state-
ments contained in documents analysed during the course of this study. While
certain biases are likely inherent in these statements, they have been made under
oath and are to the required evidentiary court standards. Furthermore, state-
ments provided by the witnesses were cross-referenced and corroborated by
other witnesses and evidence. As such, the researchers deemed these documents
to be both valid and reliable to be used as a data source in this research project.
Analytical strategy
The study used thematic analysis (Braun and Clarke 2006), using NVivo version
11 (a software package for qualitative analysis) to examine the procedural ele-
ments of the Madoff Investment Scheme. The purpose of the thematic analysis
was to identify patterns in the data that are relevant to stages of crime com-
mission. The coding was performed by two independent coders, with a kappa
coefficient of inter-rater agreement of 0.8 (Neuendorf 2002), which indicates a
strong level of agreement between the coders. As recommended by Braun and
Clarke (2006), the researchers carefully reviewed the documents, developed and
applied initial data codes, grouped these initial codes into larger themes and
then re-examined the original documents to ensure that the identified themes
adequately represented the data. Finally, guided by Cornish’s (1994) idea of the
universal script, themes most relevant to the main objective (in this case, devel-
oping a crime script) and most representative of the data were selected to form
the basis of the crime script. These themes focused on: the details of the events,
the actions of those involved, their decision-making process, the involvement
of third parties, the involvement of the authorities, the resources necessary for
successful commission of the offence and the situational factors affecting the
decision-making process and third parties involved in the commission of the
offence(s).
A crime script analysis of the Madoff Investment Scheme 75
The crime script for the Madoff Investment Scheme consists of 12 steps, organ-
ised into three stages. Each of the steps identified in the crime script relates to the
overarching Ponzi scheme which perpetuated the case. While the scheme involved
a broad range of criminal activities, this analysis focuses on the macro-level Ponzi
scheme at the centre of the scandal. There were many contingent offences which
could also be analysed at the micro-level. In particular, there are several micro-level
methods that Madoff and his network of accomplices used in order to avoid due dili-
gence probes, comply with regulatory oversight requirements and escape SEC inves-
tigations relatively unscathed. However, these methods and contributing offences are
at a narrower level of analysis and are outside the scope of this study.
The three stages identified in this crime script are development, misappropria-
tion and continuation (see Fig. 1). The development stage consisted of establishing a
legitimate business, planning the mechanics of the Ponzi and a range of precursory
crimes to facilitate the main components of the investment scheme. The misappro-
priation stage involved screening and meeting with potential victims, including indi-
vidual investors and feeder funds, and culminated in receiving funds from victims.
The continuation stage had multiple purposes. First and foremost, the scheme relied
on false trading documents to deceive both victims and regulatory authorities. It also
leveraged the false earnings of previous victims to build a false sense of prestige
and exclusivity to the scheme, attracting interest from future victims and lowering
potential victims’ suspicion of Madoff’s implausible returns. Finally, the continua-
tion stage relied on new investments in order to pay redemptions to previous victims
and perpetuate the fraud.
Stage 1: Development
The development stage was primarily preparatory. It involved: devising the scheme;
establishing legitimate and fraudulent business structures; creating trading accounts,
which were supplanted by trading records for later victims; and then entering the
market with the offer of fraudulent services.
Madoff structured his investment scheme so that it looked like he was able to match
the returns of the S&P 500 using a non-existent investment strategy which he called
a ‘split-strike conversion’ (Gregoriou and Lhabitant 2009). Madoff’s strategy pur-
portedly combined a long equity position together with a long put and a short call
(Bernard and Boyle 2009), although specific details were not disclosed to investors
under the pretence that it was proprietary information. It is not clear if Madoff’s
legitimate dealer–broker business existed prior to his intention to create a Ponzi
scheme within his companies. During his sentencing, Madoff claimed that the fraud
had begun in the early 1990s as an emergency measure from which he had never
76 J. Hardy et al.
been able to extract himself (USA v. Madoff 2009b; Arvedlund 2009: 8). Five years
later, after numerous investigations and prosecutions, it seems that the scheme began
much earlier, either in the 1960s or in the early 1970s (USA v. Bonventre 2013).
Regardless of the specific sequencing of Madoff’s actions, it is almost certain that
any existing businesses would have been restructured out of necessity in order to
accommodate the fraudulent activities which became the centrepiece of Madoff’s
financial empire. Therefore, preparation by planning the mechanics of the invest-
ment scheme preceded creating the necessary business structures to perpetrate the
fraud.
In the late 1960s, Madoff created BLMIS and marketed it as a pure brokerage busi-
ness. Officially, BLMIS executed transactions on behalf of clients—something that
Madoff continued to present as its core business to SEC investigators until at least
2006 (Committee on Financial Services 2009). In the 1980s, BLMIS embraced the
technological revolution that was underway on Wall Street and began executing
trades off the floor of the New York Stock Exchange and using computer systems to
trade faster and more cheaply than most of its competitors (Gregoriou and Lhabitant
2009). Meanwhile, Madoff opened and operated bank accounts with Chase Manhat-
tan Bank, which later became JP Morgan Chase & Co following a merger. Madoff
A crime script analysis of the Madoff Investment Scheme 77
used these accounts for both legitimate and fraudulent purposes (Seal and Squillari
2009), but it appears that most of the illicit funds were held with JP Morgan Chase
(Davis and Wilson 2011). These business structures were an instrumental precondi-
tion for Madoff to offer trade services to prospective victims.
Madoff used BLMIS to create false trading accounts and, over time, established
records to monitor and respond to victim inquiries. These trading accounts were
mixed with legitimate business accounts which Madoff used to provide brokerage
services (Gregoriou and Lhabitant 2009), and evidence the instrumental initiation of
Madoff’s fraud. Once the trading accounts were established, Madoff had the capabil-
ity to move investors’ funds into the Ponzi scheme he had devised.
By all accounts, one of the Madoff’s earliest victims was his close friend Carl Sha-
piro (Kirtzman 2010). Beginning in the 1960s, Madoff began offering what were
effectively unregistered investment advisor services to a handful of wealthy clients,
many of whom he had personal relationships with. Madoff’s fraud began as a clear
affinity fraud, before it increased in size and relied on reputation more than personal
relationships to lure new victims (Arvedlund 2009). The market entry point is the
‘doing’ step of the initial offences, which involves establishing false instruments in
order to commit fraud and ends the preparatory stage of the crime script. The second
stage involved actualising the fraud by misappropriating funds from victims, while
the third stage creates the financial loop which constitutes a Ponzi-type scheme
(Zuckoff 2006).
Stage 2: Misappropriation
The misappropriation stage involved screening and meeting with potential victims,
culminating in receiving investment funds from victims. This stage demonstrates
how a fraud offence has occurred (Button et al. 2009).
For most of the duration of the Madoff Investment Scheme, entry was seemingly
difficult for prospective victims. Many were referred by existing victims and found
that they would be turned away if they asked too many questions or expressed an
interest in conducting appropriate due diligence checks (Oppenheimer 2009: 3).
However, there were also times when Madoff leveraged the perception of exclusiv-
ity that he had cultivated in order to garner interest from very wealthy victims. This
is consistent with other types of fraud offences, which often leverage perceptions
of authority, legitimacy and exclusivity against victims (Button et al. 2014; Shover
et al. 2003). During the 1990s, Madoff reportedly used a network of recruiters and
78 J. Hardy et al.
feeder funds to raise capital (Seal and Squillari 2009). There was also a large intake
of victims after Madoff’s first feeder fund, operated by Avellino and Bienes who had
been unregistered investment advisors, was shut down by the SEC in 1992. Madoff
was quick to voluntarily return investors’ $442 million, claiming that he had not
been aware that Avellino and Bienes were not registered with the SEC (Hurt 2009).
According to Madoff’s secretary, Eleanor Squillari, many of Avellino and Bienes’
clients had not realised that their money had already been managed by Madoff
through the feeder fund arrangement. Nevertheless, many of Avellino and Bienes’
clients demanded to be allowed access to direct investments with Madoff (Seal and
Squillari 2009). Victim screening was an instrumental precondition for allowing a
potential victim to participate in the fraudulent investment scheme, as Madoff was
cautious in his victim selection practices.
Victims were recruited in one of the two ways: either through Madoff directly or
through a feeder fund. Madoff often met his direct victims personally and engendered
trust with the facade of a family-owned business (Oppenheimer 2009: 3). Direct vic-
tims were lured in through trust relationships (Stolowy et al. 2014) created by both
Madoff’s personal connections and professional reputation (Perri and Brody 2012).
These victims included individuals and entire feeder funds, all of whom were caught
in an affinity fraud (Fairfax 2001–2002; van de Bunt 2010) with Madoff at its cen-
tre. Indirect victims had invested in a feeder fund that had assigned trading authority
to BLMIS. Some victims were aware of Madoff’s role in managing their funds, while
others did not find out about Madoff or his involvement in their financial affairs until
after the scandal broke in late 2008 (Kirtzman 2010). The recruitment of new victims
was the instrumental actualisation of Madoff’s initial fraud, convincing individuals and
A crime script analysis of the Madoff Investment Scheme 79
funds to give him access to and control over their money. This recruitment process led
directly to receiving victims’ funds, which completed the initial fraudulent financial
transaction between Madoff and his victims.
When victims deposited funds into BLMIS accounts with JP Morgan Chase or
accounts managed by Madoff’s feeder funds, the initial fraud was complete. However,
the ‘doing’ component of the first fraud was only a precursor to the ongoing and repeat
victimisation of unaware investors.
Stage 3: Continuation
The continuation stage served three functions. The first function was to conceal the
fraud that had already occurred by fabricating trading account documents. The sec-
ond function was to perpetuate the scheme by using previous victims’ false earnings
to attract new investors. The third function was to use incoming funds to pay returns
to previous investors with new funds. This relationship between the second and third
stages of the crime script constitutes the crucial element of a Ponzi scheme, differenti-
ating it from other types of fraud.
Madoff provided returns and redemptions to earlier investors using the direct
investment of investors who joined the scheme later. Madoff generally used
incoming funds to pay returns, but he also relied on bank loans, transfers between
his legitimate and fraudulent businesses, and sometimes international transfers
of ‘fee payments’ between his businesses to pay out redemptions (Lewis 2016;
Seal and Squillari 2009). For new investors, these payments constituted the
‘doing’ component of the offence because their investment had been misused to
pay returns instead of being genuinely invested as they had believed. For ear-
lier investors receiving payments, this was also a post-condition of the original
offence committed against them because it perpetuated the scheme.
Madoff periodically provided victims with fictitious investment reports that indi-
cated steady and above-average returns on investments. Madoff’s accomplices cre-
ated detailed transaction records and generated official statements in response to
victim enquiries (USA v. DiPascali 2009). For previous victims, this was a post-
condition intended to conceal the fraud. For future victims, this was an instrumen-
tal precondition for Step 6: Victim communication and Step 7: Victim meeting, as
the history of positive investment reports and evidence of investor returns, both of
which increased over time, added significant credibility to the scheme.
80 J. Hardy et al.
Madoff and his accomplices prepared and submitted trading account documenta-
tion when requested by the SEC to obfuscate the nature of the Ponzi scheme. This
complied with existing oversight mechanisms and contributed to the longevity of
his scheme. Creating false records served as a post-condition for both initial and
repeat victimisation, allowing the Madoff Investment Scheme to continue unde-
tected for more than 30 years.
The impact of the global financial crisis in 2008–2009 had investors all over Wall
Street seeking to liquidate their investments (Crotty 2009). Madoff’s final victim
was Martin Roseman, who deposited $10 million into an account held by BLMIS
with JP Morgan Chase only 5 days before the scheme collapsed (Oppenheimer
2009: 5–6). Madoff’s inability to attract sufficient new investors to meet the $7
billion in redemptions he owed to earlier victims ultimately led to his confes-
sion to his family on 10 December 2008 (Hurt 2009). It is important to note that
regulators, law enforcement and victims were unaware of the extensive crimes
committed by Madoff and his accomplices until December 2008. Even then, they
did not learn the truth through chance or circumstance. The world discovered
Madoff’s crimes at the time of his choosing (Seal and Squillari 2009).
Crime prevention refers to a broad range of efforts which are intended to control,
reduce and deter crime. This includes situational crime prevention, which focuses
on reducing opportunities for crime by targeting contributory factors to specific
offences with tailored responses (Clarke 1997). Although it began as a method
of affecting the relationship between offenders and the environments in which
offences occur (Jeffrey 1977; Lab 1992), situational crime prevention soon shifted
focus to target hardening and crime displacement techniques (Wortley 1998). The
focus on a rational choice to engage in crime is not applicable to all crime types,
particularly in the case of emotive or expressive offences (Hayward 2007), but it
is readily applicable to complex or organised crimes which are intending to gen-
erate profit through deception (Liddick 1999; Edwards and Gill 2002). Situational
crime prevention has often been equated with opportunity reduction (Clarke
1997; Clarke and Weisburd 1994) but also includes focused deterrence (Braga
and Weisburd 2011), creating anticipatory benefits (Smith et al. 2002) and con-
trolling situational factors which might pressure, prompt, permit or provoke indi-
viduals to offend (Cornish and Clarke 2003: 46–48; Wortley 2001). Situational
crime prevention strategies are rarely directly applicable to types of white-collar
crimes which rely on interpersonal trust and communication. Nevertheless, situ-
ational crime prevention techniques offer insight into sophisticated fraud cases.
A crime script analysis of the Madoff Investment Scheme 81
Numerous regulation and crime prevention strategies for monitoring and control-
ling the capability to commit fraud offences already exist (Levi 1987; Graycar and
Sidebottom 2012). Examples include requirements for people with specialist skills
or in trusted positions to register with regulatory bodies, regulatory oversight of
financial transactions and controlling access to information or systems which could
be used to facilitate white-collar crime (Benson and Madensen 2007; Bosley and
Knorr 2018). Governments can also require financial services companies to desig-
nate responsibilities for fraud compliance and monitoring to specific individuals or
teams, mandate anti-fraud training and independent whistle-blowing mechanisms
and regulate vetting processes for people in sensitive or trusted positions (Brooks
et al. 2009; Tunley et al. 2018). These controls can be both systemic and localised in
order to target a range of capabilities relevant to fraud prevention (Graycar and Pren-
zler 2013). These existing techniques provide an excellent set of tools with which to
regulate the capabilities required to perpetrate sophisticated fraud offences.
Crime prevention in sophisticated frauds, such as the Madoff Investment Scheme,
could apply the fraud diamond and situational crime approaches to target the oppor-
tunities and capabilities which enable affinity and Ponzi frauds. Criminal opportuni-
ties to engage in large-scale sophisticated frauds rely on communicative access to
potential victims and either trust in affinity-based networks or status in professional
contexts. The most useful steps of the Madoff crime script for targeting criminal
opportunities are Steps 6 and 7, during which an offender must build a personal rap-
port with a victim and convince them to enter into a fraudulent scheme (see Table 1).
Appropriate crime prevention techniques for opportunity reduction include
promoting awareness of fraudulent schemes, increasing access to due diligence
information and services, and assisting victim communities to report suspicious
approaches or offers. The capabilities required—particularly the skills, licences and
permissions—can vary significantly between different fraud offences (Levi 2008:
397–398) but tend to include industry knowledge and financial expertise, which can
only be gained through education and experience (Goldstraw-White 2012). The most
useful stages of the Madoff crime script for targeting capabilities are Steps 9–11,
during which offenders must make return and redemption payments to victims, pro-
vide seemingly legitimate investment reports and submit compliance documents to
regulatory bodies. The crime prevention goal with these techniques is to regulate
capabilities and increase the risk of detection for offenders engaged in white-collar
crimes (Benson and Madensen 2007). This can be achieved by maintaining a regis-
ter for critical skills required to perpetrate sophisticated frauds, mandating vetting
processes for people in sensitive or trusted positions, requiring designated compli-
ance officers within financial services companies, regularly auditing compliance
documents and providing whistle-blowing methods for concerned employees and
victims.
Table 1 Crime prevention techniques for sophisticated trust and affinity frauds
Target Crime script Prevention strategies
Conclusion
Procedural analysis of the Madoff Investment Scheme demonstrates that the offence
followed a crime script which consisted of 12 macro-level steps which can be organ-
ised in three distinct stages. The scheme began with a development stage, during
which Madoff established both a legitimate business front and a fraudulent invest-
ment business structure to facilitate the financial management of his crimes. The
scheme then entered the misappropriation stage, which actualised the initial fraud by
screening and meeting with victims and then receiving payments. The scheme then
entered a continuation stage which was both recursive and iterative. The continua-
tion stage facilitated the cycle of victimisation required to perpetrate a Ponzi scheme
by providing false records to conceal the offence, fabricating documents to substan-
tiate victim accounts, redistributing misappropriated funds to make victim payments
and luring new victims with a pretence of legitimacy.
This crime script offers insight into potential crime prevention opportunities
which could be useful for both researchers and practitioners. Situational crime pre-
vention in sophisticated frauds, such as the Madoff Investment Scheme, could apply
the fraud diamond and situational crime prevention approaches to target the oppor-
tunities and capabilities which enable affinity and Ponzi frauds. The opportunity to
engage in sophisticated fraud offences could be addressed at Step 6: Victim com-
munication and Step 7: Victim recruitment of the crime script, where target harden-
ing and extending guardianship techniques may be most effective. The capability
to engage in sophisticated fraud offences could be addressed at Step 9: Victim pay-
ment, Step 10: Fabricating investment reports and Step 11: False trading records of
the crime script, where techniques intended to strengthen formal surveillance and
assist natural surveillance may be most effective.
These findings demonstrate opportunities for law enforcement and regulatory
organisations to consider applying several crime prevention strategies at specific
steps of complex fraud offences in order to reduce opportunities and regulate or
monitor the capabilities required to commission sophisticated white-collar crimes.
The modular application of crime script theory that has been presented in this study
could be of further utility to researchers, offering an opportunity to apply CSA
methods to both other cases of white-collar crime and a broader range of complex
criminal offences.
Appendix A: Affidavits
The Office of the Inspector General (OIG) conducted testimony on the record and
under oath of the following individuals:
2. Alex Sadowski, Assistant General Counsel, Getco LLC, former Branch Chief,
Office of Compliance Inspections and Examinations, Securities and Exchange
Commission, taken on February 13, 2009, at 10:15 a.m.
3. Redacted name of Staff Accountant, Office of Compliance Inspections and
Examinations, Securities and Exchange Commission, taken on February 19,
2009, at 2:20 p.m., referred to as ‘OCIE Staff Accountant’.
4. Mavis Kelly, Branch Chief (now Assistant Director), Office of Compliance
Inspections and Examinations, Securities and Exchange Commission, taken on
February 23, 2009, at 10:35 a.m.
5. Walter Ricciardi, Partner, Paul Weiss Rifkind Wharton & Garrison LLP, former
District Administrator, Boston District Office and former Deputy Director, Divi-
sion of Enforcement, Securities and Exchange Commission, taken on February
26, 2009, at 10:48 a.m.
6. Redacted name of Eric Swanson’s former fiancé, taken on March 2, 2009, at
2:45 p.m., referred to in as ‘Jane Doe’.
7. Jacqueline Wood, Associate, Proskauer Rose LLP, former Staff Attorney Securi-
ties and Exchange Commission, taken on March 9, 2009, at 9:40 a.m., excerpted
portions of which are at Exhibit 7.
8. Redacted name of Assistant Director, Office of Compliance Inspections and
Examinations, Securities and Exchange Commission, taken on March 13, 2009,
at 9:29 a.m., referred to as ‘OCIE Assistant Director’.
9. Gene Gohlke, Associate Director, Office of Compliance Inspections and Exami-
nations, Securities and Exchange Commission, taken on March 16, 2009, at 2:03
p.m.
10. Matthew Daugherty, Branch Chief (now Senior Special Counsel), Office of
Compliance Inspections and Examinations, Securities and Exchange Commis-
sion, taken on March 23, 2009, at 2:06 p.m.
11. Redacted name of Staff Attorney, Office of Compliance Inspections and Exami-
nations (now Staff Attorney, Division of Trading and Markets), Securities and
Exchange Commission, taken on March 25, 2009, at 11:02 a.m., referred to as
‘OCIE Staff Attorney’.
12. Dorothy Eschwie, Assistant Regional Director, New York Regional Office, Secu-
rities and Exchange Commission, taken on March 26, 2009, at 11:50 a.m.
13. Thomas Thanasules, Securities Compliance Examiner (now Staff Accountant),
New York Regional Office, Securities and Exchange Commission, taken on
March 26, 2009, at 1:32 p.m.
14. Michael Kress, Branch Chief, New York Regional Office, Securities and
Exchange Commission, taken on March 26, 2009, at 2:04 p.m.
15. Neil Chelo, Director of Research, Benchmark Plus Management LLC, taken on
March 31, 2009, at 11:45 a.m.
16. Frank Casey, President-USA, Fortune Asset Management, taken on March 31,
2009, at 3:06 p.m.
17. Grant Ward, Senior Counsel, MetLife Group, former Assistant District Admin-
istrator, Boston District Office, Securities and Exchange Commission, taken on
March 31, 2009, at 5:10 p.m.
86 J. Hardy et al.
18. Edward Manion, Staff Accountant, Boston Regional Office, Securities and
Exchange Commission, taken on April 1, 2009, at 1:15 p.m.
19. Michael Garrity, Branch Chief (now Assistant Regional Director), Boston
Regional Office, Securities and Exchange Commission, taken on April 1, 2009,
at 10:30 am and April 2, 2009, at 2:30 p.m.
20. John Dugan, former Branch Chief and Assistant Regional Director, now Associ-
ate Regional Director, Boston Regional Office, Securities and Exchange Com-
mission, taken on April 2, 2009, at 9:25 a.m.
21. Andrew Caverly, former Staff Attorney and Branch Chief (now Assistant
Regional Director, Broker-Dealer Inspection Program, Boston Regional Office,
Securities and Exchange Commission, taken on April 2, 2009, at 1:15 p.m.
22. David Bergers, Assistant District Administrator (now Regional Director), Boston
Regional Office, Securities and Exchange Commission, taken on April 2, 2009,
at 3:12 p.m.
23. Eric Swanson, General Counsel, BATS Trading, former Assistant Director,
Office of Compliance Inspections and Examinations, Securities and Exchange
Commission, taken on April 15, 2009, at 9:25 a.m.
24. Lori Richards, former Director, Office of Compliance Inspections and Examina-
tions, Securities and Exchange Commission, taken on April 17, 2009, at 10:05
a.m.
25. Redacted name former Branch Chief, Office of Investor Education and Advo-
cacy, Securities and Exchange Commission, taken on April 20, 2009, at 2:05
p.m., referred to as ‘former OIEA Branch Chief’.
26. Vance Anthony, Financial Economist, Office of Economic Analysis, Securities
and Exchange Commission, taken on April 21, 2009, at 10:10 a.m.
27. Stewart Mayhew, Assistant Chief Economist (now Deputy Chief Economist),
Office of Economic Analysis, Securities and Exchange Commission, taken on
April 21, 2009, at 12:45 p.m.
28. Jonathan Sokobin, Deputy Chief Economist (now Director, Office of Risk
Assessment), Securities and Exchange Commission, taken on April 22, 2009,
at 3:20 p.m.
29. Mark Donohue, Branch Chief and Assistant Director, Office of Compliance
Inspections and Examinations, Securities and Exchange Commission, taken on
April 23, 2009, at 10:06 a.m.
30. John McCarthy, General Counsel, Getco LLC, former Staff Attorney, Division
of Market Regulation, and former Associate Director, Office of Compliance
Inspections and Examinations, Securities and Exchange Commission, taken on
April 27, 2009, at 9:45 a.m.
31. Juan Marcelino, Shareholder, Greenberg Traurig LLP, former Regional Admin-
istrator, Boston Regional Office, Securities and Exchange Commission, taken
on April 27, 2009, at 1:30 p.m.
32. William Dale, former Assistant Chief Economist, Office of Economic Analysis,
Securities and Exchange Commission, taken on April 28, 2009, at 2:43 p.m.
33. George Curtis, Regional Director, Denver Regional Office (now Deputy Direc-
tor, Division of Enforcement), Securities and Exchange Commission, taken on
April 29, 2009, at 4:33 p.m.
A crime script analysis of the Madoff Investment Scheme 87
34. Leslie Kazon, Assistant Regional Director, Division of Enforcement, New York
Regional Office, Securities and Exchange Commission, taken on April 30, 2009,
at 11:12 a.m.
35. Andrew Calamari, Branch Chief (now Associate Regional Director), Division of
Enforcement, New York Regional Office, Securities and Exchange Commission,
taken on April 30, 2009, at 12:10 p.m.
36. Mark Schonfeld, Litigation Partner, Gibson Dunn & Crutcher, former Senior
Counsel, Boston District Office and former Branch Chief, Assistant Director,
Associate Director and Regional Director, Northeast Regional Office, Securities
and Exchange Commission, taken on April 30, 2009, at 2:55 p.m.
37. Redacted name of Branch Chief, Office of Investor Education and Advocacy,
Securities and Exchange Commission, taken on May 1, 2009, at 2:02 p.m.,
referred to as ‘OIEA Branch Chief’.
38. Tina Barry, Branch Chief (now Assistant Director), Office of Compliance
Inspections & Examinations, Securities and Exchange Commission, taken on
May 1, 2009, at 3:29 p.m.
39. William Ostrow, Senior Compliance Examiner (now Staff Accountant), New
York Regional Office, Securities and Exchange Commission, taken on May 5,
2009, at 9:59 a.m. and August 19, 2009, at 10:08 a.m.
40. John Nee, Assistant Regional Director, New York Regional Office, Securities
and Exchange Commission, taken on May 6, 2009, at 10:50 a.m.
41. Redacted name of Staff Attorney, New York Regional Office, Securities and
Exchange Commission, taken on May 11, 2009, at 11:00 a.m., referred to as
‘New York Staff Attorney’.
42. Redacted name of Senior Attorney, New York Regional Office, Securities and
Exchange Commission, taken on May 11, 2009, at 1:54 p.m., referred to as ‘New
York Staff Attorney’.
43. Israel Friedman, Staff Attorney (now Branch Chief), New York Regional Office,
Securities and Exchange Commission, taken on May 11, 2009, at 12:00 p.m.
44. Alex Vasilescu, Supervisory Trial Counsel and Chief of the Trial Unit, New
York Regional Office, Securities and Exchange Commission, taken on May 11,
2009, at 12:54 p.m.
45. Jason Gettinger, Regional Litigation Counselor, Division of Enforcement, New
York Regional Office, Securities and Exchange Commission, taken on May 11,
2009, at 2:35 p.m.
46. Linda Thomsen, Partner, Davis Polk & Wardwell, former Director, Division of
Enforcement, Securities and Exchange Commission, taken on May 11, 2009, at
2:34 p.m.
47. Redacted name of former Examiner, Office of Compliance Inspections and
Examinations, Securities and Exchange Commission, taken on May 11, 2009,
at 3:19 p.m., referred to as ‘former Examiner #1’.
48. Paul Pocress, Staff Accountant, New York Regional Office, Securities and
Exchange Commission, taken on May 11, 2009, at 3:31 p.m.
49. Redacted name of Staff Accountant (now Branch Chief), Division of Investment
Management, New York Regional Office, Securities and Exchange Commis-
88 J. Hardy et al.
sion, taken on May 11, 2009, at 3:48 p.m., referred to in the ROI as ‘IM Staff
Accountant’.
50. Robert Sollazzo, Associate Regional Director, New York Regional Office, Secu-
rities and Exchange Commission, taken on May 12, 2009, at 10:35 a.m.
51. Peter Lamore, Securities Compliance Examiner (now Staff Accountant), New
York Regional Office, Securities and Exchange Commission, taken on May 14,
2009, at 9:25 a.m. and August 19, 2009, at 10:30 a.m.
52. Stephen Johnson, Staff Accountant (now Branch Chief), Division of Enforce-
ment, New York Regional Office, Securities and Exchange Commission, taken
on May 21, 2009, at 10:38 a.m.
53. Redacted name of Staff Attorney, Division of Enforcement, Securities and
Exchange Commission, taken on May 21, 2009, at 11:00 a.m., referred to as
‘Enforcement Staff Attorney’.
54. Redacted name of former Attorney Advisor, Office of Compliance Inspections
and Examinations, Securities and Exchange Commission, taken on May 21,
2009, at 2:05 p.m., referred to as ‘former OCIE Attorney Advisor’.
55. Simona Suh, Staff Attorney (now Branch Chief), Division of Enforcement, New
York Regional Office, Securities and Exchange Commission, taken on May 27,
2009, at 9:35 a.m.
56. Peter Uhlmann, Chief of Staff to the Chairman (now Senior Advisor, Office of
Executive Director), Securities and Exchange Commission, taken on May 28,
2009, at 10:00 a.m.
57. Doria Bachenheimer, former Assistant Director, Division of Enforcement,
Northeast Regional Office, Securities and Exchange Commission, taken on June
3, 2009, at 12:10 p.m.
58. Meaghan Cheung, former Branch Chief, Division of Enforcement, Northeast
Regional Office, Securities and Exchange Commission, taken on June 4, 2009,
at 10:40 a.m.
59. Redacted name of former Staff Attorney, Division of Enforcement, Northeast
Regional Office, Securities and Exchange Commission, taken on June 10, 2009,
at 1:55 p.m., referred to as ‘former New York Enforcement Staff Attorney #2’.
60. Redacted name of Assistant Regional Director, Division of Enforcement, New
York Regional Office, Securities and Exchange Commission, taken on June 10,
2009, at 4:20 p.m., referred to as ‘Enforcement Assistant Regional Director’.
61. Susan Tibbs, Director, Market Regulation Department, formerly known as
National Association of Securities Dealers (NASD), now known as Financial
Industry Regulatory Authority (FINRA), taken on June 19, 2009, at 3:20 p.m.
62. Christopher Cox, former Chairman, Securities and Exchange Commission, taken
on June 19, 2009, at 3:11 p.m.
63. Jordan Materna, Director, Chicago Board Options Exchange, taken on June 22,
2009, at 2:35 p.m.
64. Gene DeMaio, Senior Vice President, National Association of Securities Deal-
ers, taken on June 25, 2009, at 2:07 p.m.
65. Susan Geigel, Director of Legal and Regulatory Compliance Depository Trust
and Clearing Corporation, taken on June 26, 2009, at 11:30 a.m.
A crime script analysis of the Madoff Investment Scheme 89
11. Redacted name of Staff Attorney, Office of Compliance Inspections and Exami-
nations (now Staff Attorney, Division of Trading and Markets), Securities and
Exchange Commission, conducted on March 3, 2009, referred as ‘OCIE Staff
Attorney’.
12. Dawn Libal, Examiner (now Staff Accountant), New York Regional Office,
Securities and Exchange Commission, conducted on March 4, 2009.
13. Harvey Westbrook Jr., former Financial Economist (now Senior Economist),
Office of Risk Assessment, Securities and Exchange Commission, conducted
on March 4, 2009.
14. Redacted name of former Attorney Advisor, Office of Compliance Inspections
and Examinations, Securities and Exchange Commission, conducted on March
4, 2009, referred to as ‘former OCIE Attorney Advisor’.
15. Gregory Stahl, Chartered Financial Analyst, SEI Investments, conducted on
March 6, 2009.
16. James Overdahl, Chief Economist, Office of Economic Analysis, Securities and
Exchange Commission, conducted on March 11, 2009.
17. Paul Broder, Risk Manager, Renaissance Technologies Corporation, conducted
on March 12, 2009.
18. Henry Laufer, Chief Scientist, Renaissance Technologies Corporation, con-
ducted on March 12, 2009.
19. Nathaniel Simons, Portfolio Manager, the Meritage Fund, conducted on March
12, 2009.
20. Joseph Cella, former Chief, Office of Market Surveillance, Division of Enforce-
ment, Securities and Exchange Commission, conducted on March 13, 2009.
21. Redacted name of former Securities Compliance, Chicago Regional Office
(formerly Midwest Regional Office), Securities and Exchange Commission,
conducted on March 17, 2009, referred to as ‘former Securities Compliance
Examiner’.
22. John Ehinger, Chief Compliance Officer and General Counsel for Placemark
Investments, former Staff Attorney, Division of Market Regulation, Securities
and Exchange Commission, conducted on March 17, 2009.
23. Redacted name of Senior Counsel, Division of Enforcement, Securities and
Exchange Commission, conducted on March 20, 2009, referred to as ‘Enforce-
ment Senior Counsel’.
24. Redacted name of Office of Internet Enforcement Official, Division of Enforce-
ment, Securities and Exchange Commission, conducted on March 20, 2009,
referred to as ‘Office of Internet Enforcement Official’.
25. Jim Adelman, General Counsel, Commonwealth Financial Network, for-
mer Associate District Administrator, Boston District Office, Securities and
Exchange Commission, conducted on March 24, 2009, and April 30, 2009.
26. Unidentified Hedge Fund Manager, taken on March 26, 2009.
27. Unidentified Chief Information Officer (CIO), unidentified fund of funds firm,
conducted on April 7, 2009.
28. Silvestre Fontes, Branch Chief (now Senior Trial Counsel), Division of Enforce-
ment, Boston Regional Office, Securities and Exchange Commission, conducted
on April 7, 2009 and April 10, 2009.
A crime script analysis of the Madoff Investment Scheme 91
29. Grant Ward, Senior Counsel, MetLife Group, former Assistant District Adminis-
trator, Boston District Office, Securities and Exchange Commission, conducted
on April 8, 2009.
30. John Guthery, Vice President, LPL Financial, conducted on April 9, 2009.
31. Harry Markopolos, Chartered Financial Analyst and Certified Fraud Examiner,
conducted on April 13, 2009.
32. Redacted name of Staff Attorney, Division of Enforcement, Securities and
Exchange Commission, conducted on April 13, 2009, referred to as ‘Enforce-
ment Staff Attorney’.
33. Juan Marcelino, Shareholder, Greenberg Traurig LLP, former Regional Admin-
istrator, Boston District Office, Securities and Exchange Commission, conducted
on April 14, 2009.
34. Steve Luparello, Vice Chairman, Financial Industry Regulatory Authority, con-
ducted on April 14, 2009.
35. Michael Garrity, Branch Chief (now Assistant Regional Director), Boston
Regional Office, Securities and Exchange Commission, conducted on April
17, 2009.
36. Jim Fanslau, Criminal Investigator, Division of Enforcement, Securities and
Exchange Commission, conducted on April 17, 2009.
37. Sonam Varghese, Branch Chief, Office of Compliance Inspections and Examina-
tions, New York Regional Office, Securities and Exchange Commission, con-
ducted on April 17, 2009.
38. Sheryl Marcus, Staff Accountant, Office of Compliance Inspections and Exami-
nations, New York Regional Office, Securities and Exchange Commission, con-
ducted on April 22, 2009.
39. David Marder, Partner, Robbins Kaplan Miller & Ciresi LLP, former Assistant
District Administrator, Boston District Office, Securities and Exchange Com-
mission, conducted on April 30, 2009.
40. Azam Riaz, Staff Accountant, New York Regional Office, Securities and
Exchange Commission, conducted on May 4, 2009.
41. Redacted name of former Assistant Regional Administrator, New York Regional
Office, Securities and Exchange Commission, conducted on May 5, 2009,
referred to as ‘former Assistant Regional Administrator’.
42. Redacted name of former Assistant Regional Director, Division of Enforcement,
New York Regional Office, Securities and Exchange Commission, conducted
on May 6, 2009, referred to in the ROI as ‘former Assistant Regional Director’.
43. Richard Walker, General Counsel, Deutsche Bank, former Regional Director of
the New York Regional Office, conducted on May 8, 2009.
44. Redacted name of former Staff Attorney, Division of Enforcement, New York
Regional Office, Securities and Exchange Commission, conducted on May 18,
2009 and June 26, 2009, referred to in the ROI as ‘former New York Enforce-
ment Staff Attorney’.
45. Edwin Nordlinger, former Deputy Regional Administrator, Division of Enforce-
ment, Northeast Regional Office, Securities and Exchange Commission, con-
ducted on May 19, 2009.
92 J. Hardy et al.
References
Arvedlund, E. 2009. Too good to be true: The rise and fall of Bernie Madoff. New York: Portfolio.
Benson, M.L., and T.D. Madensen. 2007. Situational crime prevention and white collar crime. In Inter-
national handbook of white-collar and corporate crime, ed. H.N. Pontell and G. Geis, 609–626.
Boston, MA: Springer.
Benson, M.L., T.D. Madensen, and J.E. Eck. 2009. White-collar crime from an opportunity perspective.
In The criminology of white-collar crime, ed. S.S. Simpson and D. Weisburd, 79–110. Boston,
MA: Springer.
Bernard, C., and P. Boyle. 2009. Mr Madoff’s amazing returns: An analysis of the split-strike conversion
strategy. Journal of Derivatives 17: 62–76.
Blois, K., and A. Ryan. 2013. Affinity fraud and trust within financial markets. Journal of Financial
Crime 20(2): 186–202.
Bosley, S., and M. Knorr. 2018. Pyramids, Ponzis and fraud prevention: Lessons from a case study. Jour-
nal of Financial Crime 25(1): 81–94.
Braga, A.A., and D.L. Weisburd. 2011. The effects of focused deterrence strategies on crime: A system-
atic review and meta-analysis of the empirical evidence. Journal of Research in Crime and Delin-
quency 49(3): 323–358.
Brooks, G., M. Button, and K. Frimpong. 2009. Policing fraud in the private sector: A survey of the
FTSE 100 companies in the UK. International Journal of Police Science and Management 11(4):
493–504.
Braun, V., and V. Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychol-
ogy 3(2): 77–101.
Button, M., C. Lewis, and J. Tapely. 2009. Fraud typologies and victims of fraud. London: National Fraud
Authority.
Button, M., C.M. Nicholls, J. Kerr, and R. Owen. 2014. Online frauds: Learning from victims why they
fall for these scams. Australian and New Zealand Journal of Criminology 47(3): 391–408.
Chiu, Y.N., B. LeClerc, and M. Townsley. 2011. Crime script analysis of drug manufacturing in clandes-
tine laboratories: Implications for prevention. British Journal of Criminology 51: 355–374.
Clarke, R.V. 1992. Situational crime prevention: Successful case studies. Albany, NY: Harrow and
Heston.
Clarke, R.V. 1997. Introduction. In Situational crime prevention: Successful case studies, 2nd ed, ed. R.V.
Clarke, 1–43. New York: Harrow & Heston.
Clarke, R.V. 2005. Seven misconceptions of situational crime prevention. In Handbook of crime preven-
tion and community safety, ed. N. Tilley, 39–70. London: Routledge.
Clarke, R.V., and J.E. Eck. 2005. Crime analysis for problem solvers: In 60 small steps. Washington, DC:
US Department of Justice.
Clarke, R.V., and D. Weisburd. 1994. Diffusion of crime control benefits: Observations on the reverse of
displacement. In Crime prevention studies, vol. 2, ed. R.V. Clarke. Monsey, NY: Criminal Justice
Press.
Clauss, P., T. Roncalli, and G. Weisang. 2009. Risk management lessons from Madoff fraud. In Credit,
currency or derivatives: Instruments of global financial stability or crisis?, ed. M.G. Papaioannou
and J.J. Choi, 505–543. Bingley: Emerald Publishing Group.
Cohen, L.E., and M. Felson. 1979. Social change and crime rate trends: A routine activity approach.
American Sociological Review 44(4): 588–608.
Cohen, L.E., M. Felson, and K. Land. 1980. Property crime rates in the United States: A macrodynamic
analysis, 1947–1977; with ex ante forecasts for the mid-1980s. American Journal of Sociology 86:
90–118.
Coleman, J.W. 1987. Toward an integrated theory of white-collar crime. American Journal of Sociology
93(2): 406–439.
Coleman, J.W. 1992. Crime and money: Motivation and opportunity in a monetized economy. The Ameri-
can Behavioral Scientist 35(6): 827–836.
Committee on Financial Services. 2009. Assessing the Madoff Ponzi scheme and regulatory failures.
Serial No. 11–2. US Government Printing Office, Washington. http://library.clerk.house.gov/refer
ence-files/111_fin_005.pdf.
Cornish, D.B. 1994. The procedural analysis of offending and its relevance for situational prevention. In
Crime prevention studies, ed. R.V. Clarke, 151–196. Monsey, NY: Criminal Justice Press.
94 J. Hardy et al.
Cornish, D.B., and R.V. Clarke. 1986. Introduction. In The reasoning criminal, ed. D.B. Cornish and R.V.
Clarke, 2–16. New York: Springer.
Cornish, D.B., and R.V. Clarke. 1987. Understanding crime displacement: An application of rational
choice theory. Criminology 25: 933–947.
Cornish, D.B., and R.V. Clarke. 1989. Crime specialisation, crime displacement and rational choice the-
ory. In Criminal behaviour and the justice system: Psychological perspectives, ed. H. Wegener, F.
Losel, and J. Haisch. New York: Springer.
Cornish, D.B., and R.V. Clarke. 2003. Opportunities, precipitators and criminal decisions: A reply to
Wortley’s critique of situational crime prevention. In Crime prevention studies, ed. M. Smith and
D. Cornish, 41–96. Monsey, NY: Criminal Justice Press.
Cornish, D.B., and R.V. Clarke. 2008. The rational choice perspective. In Environmental criminology and
criminal analysis, ed. R. Wortley and L. Mazerolle. Cullompton: Willan Publishing.
Cressey, D.R. 1950. The criminal violation of financial trust. American Sociological Review 15: 738–743.
Crotty, J. 2009. Structural causes of the global financial crisis: A critical assessment of the ‘new financial
architecture’. Cambridge Journal of Economics 33(4): 563–580.
Davis, L.D., and L. Wilson. 2011. Estimating JP Morgan Chase’s profits from the Madoff deposits. Risk
Management and Insurance Review 14(1): 107–119.
de Bie, J.L., C.J. de Poot, and J.P. van der Leun. 2015. Shifting modus operandi of jihadist foreign fight-
ers from the Netherlands between 2000 and 2013: A crime script analysis. Terrorism and Political
Violence 27(3): 416–440.
Dimmock, S.G., and W.C. Gerken. 2012. Predicting fraud by investment managers. Journal of Financial
Economics 105(1): 153–173.
Donegan, J.J., and M.W. Ganon. 2008. Strain, differential association, and coercion: Insights from crimi-
nology literature on causes of accountant’s misconduct. Accounting and the Public Interest 8(1):
1–20.
Eck, J.E. 1994. Drug markets and drug places: A case-control study of the spatial structure of illicit drug
dealing. Doctoral dissertation, University of Maryland, College Park.
Edwards, A., and P. Gill. 2002. Crime as enterprise? The case of transnational organised crime. Crime
Law and Social Change 37(3): 203–223.
Eren, C.P. 2017. Bernie Madoff and the crisis: The public trial of capitalism. Stanford: Stanford Univer-
sity Press.
Europol. 2015. Why is cash still king? A strategic report on the use of cash by criminal groups as a facili-
tator for money laundering. Trends in Organized Crime 18(4): 355–379.
Fairfax, L.M. 2003. The thin line between love and hate: Why affinity-based securities and investment
fraud constitutes a hate crime. UC Davis Law Review 36: 1073–1145.
Fairfax, L.M. 2001–2002. ‘With friends like these…’: Toward a more efficacious response to affinity-
based securities and investment fraud. Georgia Law Review 36: 63–119.
Farah, D. 2013. Fixers, super fixers, and shadow facilitators: How networks connect. In Convergence:
Illicit networks and national security in the age of globalization, ed. M. Miklaucic and J. Brewer,
75–96. Washington, DC: National Defense University Press.
Felson, M. 1986. Linking criminal choices, routine activities, informal control, and criminal outcomes.
In The reasoning criminal: Rational choice perspectives on offending, ed. D.B. Cornish and R.V.
Clarke, 119–128. New York: Springer.
Felson, M. 1995. Those who discourage crime. In Crime and place: Crime prevention studies, ed. J.E.
Eck and D. Weisburd, 4. Monsey, NY: Criminal Justice Press.
Gill, M. 2001. The craft of robbers of cash-in-transit vans: Crime facilitators and the entrepreneurial
approach. International Journal of the Sociology of Law 29(3): 277–291.
Goldstraw-White, J. 2012. White-collar crime: Accounts of offending behaviour. Basingstoke: Palgrave
Macmillan.
Gorta, A. 1998. Minimising corruption: Applying lessons from the crime prevention literature. Crime,
Law, and Social Change 30(1): 67–87.
Graycar, A., and T. Prenzler. 2013. Understanding and preventing corruption. Basingstoke: Palgrave
MacMillan.
Graycar, A., and A. Sidebottom. 2012. Corruption and control: A corruption reduction approach. Journal
of Financial Crime 19(4): 384–399.
Gregoriou, G.N., and F.-S. Lhabitant. 2009. Madoff: A riot of red flags. Nice: EDEHC Risk and Asset
Management Research Centre.
A crime script analysis of the Madoff Investment Scheme 95
Hancock, G., and G. Laycock. 2010. Organized crime and crime scripts: Prospects for disruption. In Situ-
ational prevention of organised crimes, ed. K. Bullock, R.V. Clarke, and N. Tilley, 172–192. New
York: Taylor & Francis.
Hayward, K. 2007. Situational crime prevention and its discontents: Rational choice theory versus the
‘culture of now’. Social Policy and Administration 41(3): 232–250.
Henriques, D.B. 2011. The wizard of lies: Bernie Madoff and the death of trust. New York: Times Books.
Hipp, J.R., and A. Perrin. 2006. Nested loyalties: Local networks’ effects on neighbourhood and commu-
nity cohesion. Urban Studies 43: 2503–2523.
Hollis, M., M. Felson, and B. Welsh. 2013. The capable guardian in routine activities theory: A theoreti-
cal and conceptual reappraisal. Crime Prevention for Community Safety 15(1): 65–79. https://doi.
org/10.1057/cpcs.2012.14.
Hurt, C. 2009. Evil has a new name (and a new narrative): Bernard Madoff. Michigan State Law Review
(Winter): 947–987.
Hutchings, A., and T. Holt. 2014. A crime script analysis of the stolen data market. British Journal of
Criminology 55: 596–614.
Jeffrey, C.R. 1977. Crime prevention through environmental design. Beverly Hills, CA: Sage.
Kassem, R., and A.W. Higson. 2012. The new fraud triangle model. Journal of Emerging Trends in Eco-
nomics and Management Sciences 3(3): 191–195.
Kennedy, J.P., C.P. Haberman, and J.M. Wilson. 2016. Occupational pharmaceutical counterfeit-
ing schemes: A crime scripts analysis. Victims & Offenders. https://doi.org/10.1080/15564
886.2016.1217961.
Kirtzman, A. 2010. Betrayal: The life and lies of Bernie Madoff. New York: HarperCollins.
Langevoort, D.C. 2009. The SEC and the Madoff scandal: Three narratives in search of a story. Michigan
State Law Review 899–914.
Lab, S.P. 1992. Crime prevention: Approaches, practices and evaluations. Cincinnati, OH: Anderson.
Levi, M. 1987. Regulating fraud. London: Tavistock Publications.
Levi, M. 2008. Organized fraud and organizing frauds: Unpacking research on networks and organiza-
tion. Criminology and Criminal Justice 8(4): 389–419.
Lewis, L.S. 2016. Bernard Madoff and his accomplices: Anatomy of a con. New York: ABC Clio.
Liddick, D. 1999. The enterprise ‘model’ of organized crime: Assessing theoretical propositions. Justice
Quarterly 16(2): 403–430.
Markopolos, H. 2010. No one would listen: A true financial thriller, 190–191. New York: Wiley.
Moreto, W., and R. Clarke. 2014. Script analysis of the transnational illegal market in endangered spe-
cies: Dream and reality. In Cognition and crime: Offender decision making and script analyses, ed.
R. Wortley and B. Le Clerc. London: Routledge.
Morrison, E.R. 2014. Extraterritorial avoidance action: Lessons from Madoff. Brooklyn Journal of Cor-
porate, Financial and Commercial Law 9(1): 268–283.
Mugarura, N. 2017. The use of anti-money laundering tools to regulate Ponzi and other fraudulent invest-
ment schemes. Journal of Money Laundering Control 20(3): 231–246.
Natarajan, M., R.V. Clarke, and B.D. Johnson. 1995. Telephones as facilitators of drug dealing—A
research agenda. European Journal on Criminal Policy and Research 3(3): 137–153.
Neuendorf, K.A. 2002. The content analysis guidebook. Thousand Oaks: Sage Publications.
Nolasco, C.A.R.I., M.S. Vaughn, and R.V. del Carmen. 2013. Revisiting the choice model of Ponzi and
pyramid schemes: Analysis of case law. Crime, Law and Social Change 60(4): 375–400.
Oppenheimer, J. 2009. Madoff with the money. New York: Wiley.
Osborne, J., and J. Capellan. 2015. Examining active shooter events through the rational choice perspec-
tive and crime script analysis. Security Journal 30(3): 880–902. https://doi.org/10.1057/sj.2015.12.
Perri, F.S., and R.G. Brody. 2012. The optics of fraud: Affiliations that enhance offender credibility. Jour-
nal of Financial Crime 19(4): 355–370.
Rhee, R.J. 2009. The Madoff scandal, market regulatory failure and the business education of lawyers.
The Journal of Corporation Law 35(2): 101–129.
Ross, B. 2009. The Madoff chronicles: Inside the secret world of Bernie and Ruth. Boston, MA:
Kingswell.
Rowe, E.T., T. Akman, R. Smith, and A. Tomison. 2013. Organised crime and public sector corruption:
A crime scripts analysis of tactical displacement risks. Trends and Issues in Crime and Criminal
Justice 444: 1.
Sandell, L. 2011. Truth and consequences: Life inside the Madoff family. Boston, MA: Little, Brown and
Co.
96 J. Hardy et al.
Schuchter, A., and M. Levi. 2013. The fraud triangle revisited. Security Journal 29(2): 107–121.
Seal, M. and E. Squillari. 2009. Hello, Madoff! Vanity Fair, June 2009.
Shover, N., G.S. Coffey, and D. Hobbs. 2003. Crime on the line. Telemarketing and the changing nature
of professional crime. British Journal of Criminology 43(3): 489–505.
Shover, N., and A. Hochstetler. 2006. Choosing white-collar crime. Cambridge: Cambridge University
Press.
Smith, F. 2010. Madoff ponzi scheme exposes; The myth of the sophisticated investor. University of Bal-
timore Law Review 40(2): 215–283.
Smith, M.J., R.V. Clarke, and K. Pease. 2002. Anticipatory benefits in crime prevention. In Analysis for
crime prevention. Crime prevention studies, vol. 13, ed. N. Tilley, 71–88. Monsey, NY: Criminal
Justice Press.
Stolowy, H., M. Messner, T. Jeanjean, and C. Richard-Baker. 2014. The construction of a trustworthy
investment opportunity: Insights from the Madoff fraud. Contemporary Accounting Research
31(2): 354–397.
Stout, D. 2009. Report details how Madoff’s web enamored SEC. New York Times. https://www.nytim
es.com/2009/09/03/business/03madoff.html.
Sykes, G., and D. Matza. 1957. Techniques of neutralization: A theory of delinquency. American Socio-
logical Review 22: 664–670.
Tillyer, M.S., and J.E. Eck. 2011. Getting a handle on crime: A further extension of routine activities
theory. Security Journal 24(2): 179–193.
Totterdell, P., D. Holman, and A. Hukin. 2008. Social networkers: Measuring and examining individual
differences in propensity to connect with others. Social Networks 30(4): 283–296.
Tunley, M., M. Button, D. Shepherd, and D. Blackbourn. 2018. Preventing occupational corruption:
Utilising situational crime prevention techniques and theory to enhance organisational resilience.
Security Journal 31(1): 21–52.
United States of America v. DiPascali, F. 2009. Transcript of Plea Proceeding, 09 CR 764 (RJS). https://
www.justice.gov/sites/default/files/usao-sdny/legacy/2012/04/16/dipascaliplea81109.pdf.
United States of America v. Friehling, D.G. 2009. Transcript of Guilty Plea Proceeding, 09 CR 700
(AKH). https://www.justice.gov/sites/default/files/usao-sdny/legacy/2012/04/16/friehling200911
03guiltypleatranscript.pdf.
United States of America v. Madoff, B.L. 2009a. Criminal Complaint, 09 CR 213 (DC). https://www.justi
ce.gov/usao-sdny/file/762661/download.
United States of America v. Madoff, B.L. 2009b. Transcript of Plea Hearing, 09 CR 213 (DC). https://
www.justice.gov/usao-sdny/file/762751/download.
United States of America v. Madoff, B.L. 2009c. Government’s Sentencing Memorandum, 09 CR 213
(DC). https://www.justice.gov/usao-sdny/file/762801/download.
United States of America v. Madoff, B.L. 2009d. Sentencing Transcript, 09 CR 213 (DC). https://www.
justice.gov/usao-sdny/file/762821/download.
United States of America v. Madoff, P. 2012a. Plea Proceeding Transcript, S7 10 Cr. 228 (LTS). https://
www.justice.gov/sites/default/files/usao-sdny/legacy/2012/06/29/20120629transcriptpetermadoffp
leaproceeding%20.pdf.
United States of America v. Madoff, P. 2012b. Transcript of Sentencing Hearing, S7 10 Cr. 228 (LTS).
https://www.justice.gov/sites/default/files/usao-sdny/legacy/2012/12/21/cckfmads.pdf.
United States of America v. Bonventre, D., Bongiorno, A., Crupi, J., O’Hara, J., and Perez, G. 2013.
Indictment, S10 10 Cr. 228, (LTS). https://www.justice.gov/sites/default/files/usao-sdny/legac
y/2015/03/25/Bonventre%2C%20Daniel%2C%20et%20al.%20S10%20Indictment.pdf.
United States Securities and Exchange Commission. 2009. Investigation of failure of the SEC to uncover
Bernard Madoff’s Ponzi scheme. Public Version. Report No. OIG-509. US SEC, Office of Investi-
gations. https://www.sec.gov/news/studies/2009/oig-509.pdf.
Vakhitova, Z.I., and P.J. Bell. 2018. A script analysis of the role of athletes’ support networks as social
facilitators in doping in sport. Crime Prevention and Community Safety 20(3): 168–188. https://doi.
org/10.1057/s41300-018-0045-8.
van de Bunt, H. 2010. Walls of secrecy and silence. Criminology & Public Policy 9(3): 435–453.
Wheeler, S. 1992. The problem of white-collar crime motivation. In White-collar crime reconsidered, ed.
K. Schlegel and D. Weisburd, 108–123. Boston: North-Eastern University Press.
Wolfe, D.T., and D.R. Hermanson. 2004. The fraud diamond: Considering the four elements of fraud.
The CPA Journal December: 38–42.
A crime script analysis of the Madoff Investment Scheme 97
Wortley, R. 1998. A two-stage model of situational crime prevention. Studies on Crime and Crime Pre-
vention 7: 173–188.
Wortley, R. 2001. A classification of techniques for controlling situational precipitators of crime. Security
Journal 14: 63–82.
Zuckoff, M. 2006. Ponzi’s scheme: The true story of a financial legend. New York: Random House.
Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published
maps and institutional affiliations.