SlideShare a Scribd company logo
Defending Securities Fraud: A Brief Description of the Law, Elements, and Defense
Techniques
By: Amanda Whitt
I. What is Securities Fraud?
Courts broadly interpret federal securities laws.1
The Securities laws of the 1930s were
enacted to redress several perceived problems in the securities market place.2
These laws were
created to promote full and fair disclosure of material information, and therefore, attempt to
remedy the problems that led up to the stock market crash.3
The Securities Acts allow
marketplace forces to determine the quality of the securities offered and the reasonableness of
the prices and terms at which they trade.4
Essentially, securities laws are anti-fraud statutes.
Therefore, while civil remedies are available, willful violations of these Acts may result in
criminal prosecutions as a violation is considered to be a fraud against society.5
II. Securities Defined
Section 2(a) (1) of the Securities Act of 1933 defines a ‘security’ as:
any note, stock, treasury stock, security future, bond, debenture, evidence of
indebtedness, certificate of interest or participation in any profit-sharing agreement,
collateral-trust certificate, reorganization certificate or subscription, transferable share,
investment contract, voting-trust certificate, certificate of deposit for a security, fractional
undivided interest in oil, gas, or other mineral rights, any put, call, straddle, option, or
privilege on any security, certificate of deposit, or group or index of securities (including
any interest therein or based on the value thereof), or any put, call, straddle, option, or
privilege entered into on a national securities exchange relating to foreign currency, or, in
1
4-17 Business Crime p 17.11, citing Superintendant of Ins. of N.Y. v. Bankers Life & Cas. Co., 404 U.S. 6 (1971);
United States v. Russo, 74 F. 3d 1383 (2d Cir. 1996); Madden v. Cowen & Co., 556 F. 3d 786 (9th Cir. Cal. 2009).
2
3-56 Criminal Defense Techniques § 56.02, p1
3
3-56 Criminal Defense Techniques §56.02, p 2
4
3-56 Criminal Defense Techniques §56.02, p 2, citing Bentel v. United States, 13 F. 3d 327
5
Id.
general, any interest or instrument commonly known as a “security”, or any certificate of
interest or participation in, temporary or interim certificate for, receipt for, guarantee of,
or warrant or right to subscribe to or purchase, any of the foregoing.
15 USC 78c (10).
With the definition encompassing so many things, it is clear as to why the courts have
understood Congress to have intended an expansive definition of “security”.6
Federal securities regulatory laws are contained within six statutes:
(1) The Securities Act of 1933, codified at 15 U.S.C. 77a et seq; controlling the
registration of public securities offerings and requiring extensive disclosure of
relevant information relating to these offerings;
(2) The Securities Exchange Act of 1934, codified at 15 U.S.C. Section 78a et seq.;
governing trading on national securities exchanges and in the over-the-counter market
and requiring the registration of brokers and dealers;
(3) The Public Utility Holding Company Act of 1935, codified at 15 U.S.C. 79a et seq.;
regulating public companies and their subsidiaries engaged in electrical and gas
utility businesses;
(4) The Trust Indenture Act of 1939, codified at 15 U.S.C. 77aaa et seq., governing debt
securities;
(5) The Investment Company Act of 1939, codified at 15 U.S.C. 80a-1 et seq., regulating
companies whose primary business is owning or trading securities; and
(6) The Investment Advisers Act of 1940, codified at 15 U.S.C. 80b-1, et seq., regulating
investment advisers. 7
Along with these six regulatory statutes, securities related conduct is also contained in various
criminal statutes, including mail and wire fraud statutes8
, criminal RICO9
, conspiracy and aiding
and abetting liability10
, obstruction of justice, and perjury and false statements statutes11
.
6
The Supreme Court, in Marine Bank v. Weaver, 455 U.S. 551, (1982), construing the virtually identical definition
of “security” under the Securities Exchange Act of 1934, the definition is “quite broad” and meant to include “the
many types of instruments that in our commercial world fall within the ordinary concept of a security,” including
“stocks and bonds, along with the countless and variable schemes devised by those who seek the use of the money
of others on the promise of profits.” Weaver, 455 U.S. at 555.
7
3-56 Criminal Defense Techniques, §56.02, p. 1
8
18 USC 1348, the securities and commodities fraud statute, makes it a crime for anyone who knowingly executes,
or attempts to execute, a scheme or artifice
to defraud any person in connection with any commodity for future delivery, or any option on a commodity
for future delivery, or any security of an issuer with a class of securities that is registered under section 12
of the Securities Exchange Act of 1934 (15 USC 78l) or that is required to file reports under section 15(d)
of the Securities Exchange Act of 1934 (15 USC 78o(d)) OR by means of false or fraudulent pretenses,
III. Criminal Penalties under 1933 and 1934 Acts
There has been a sharp increase in criminal enforcement, especially with respect to
insider trading cases, since the late seventies.12
Federal prosecutions are frequently derived from
SEC enforcement actions, which should be a cautionary note to defense attorneys. An SEC
investigation will likely result in criminal prosecution, with potential fines, as well as possible
incarceration.13
Each violation of the 1934 Act results in various penalties,14
therefore, it is wise
for the criminal defense attorney to understand each section of the 1933 and 1934 Acts before
undertaking the defense of a client charged with a securities fraud violation. The majority of
representations, or promises, any money or property in connection with the purchase or sale of any
commodity for future delivery, or any security of an issuer with a class of securities registered under
section 12 of the Securities Exchange Act of 1934 (15 USC 78l) or that is required to file reports under
section 15(d) of the Securities Exchange Act of 1934 (15 USC 78o(d)). 18 U.S.C. 1348.
Provisions of 18 USC 1348 were modeled on provisions of mail and wire fraud statutes as set forth in 18
USC 341 and 343; therefore, courts have held that the government was required to shore some intent to harm
victims. United States v. Motz, 632 F. Supp. 2d 284.
9
3-56 Criminal Defense Techniques § 56.02, 18 U.S.C. § 1961(1)(D); 18 U.S.C. § 1961(1)(B)
10
Id., 18 U.S.C. § 2, however, there is a commonly used defense technique when defendants are charged with aiding
and abetting securities fraud. Defense attorneys commonly argue (1) that there was no underlying securities
violation; and (2) that the alleged aider or abettor did not have the requisite knowledge of the infraction. United
States v. Kessi, 868 F. 2d 1097, 1104 (9th Cir. 1989).
11
Id., 18 U.S.C. §§ 1621, 1623; 18 U.S.C. § 1503; 18 U.S.C. § 100. A cautionary note for defense attorneys though;
for the government to charge under a false statements or obstruction of justice statute, the faulty information does
not need to be material in order to violate the statutes, whereas in a securities fraud violation, materiality is an
element of the offense. 3-56 Criminal Defense Techniques § 56.02, citing United States v. Ruggiero, 934 F. 2d 440,
446 (2d Cir. 1991) (likewise, for a defendant to be charged with obstruction of justice, his endeavor to obstruct need
not be successful). 3-56 Criminal Defense Techniques § 56.02, citing United States v. Russell, 255 U.S. 138, 143
(1921). Although indicted with false statements and perjury, Martha Stewart was brought in front of the grand jury
initially as an insider trading witness. United States v. Stewart, 433 F. 3d 273 (2d Cir. 2006).
12
See 4-17 Business Crime P. 17.11, note 2, “these statistics are based on a review of the Annual Securities and
Exchange Commission Reports to Congress, for the years of 1982 through 1997.”
13
Note the recent case gaining national recognition, United States v. Rajaratnam, 2011 U.S. Dist. LEXIS 91365
(S.D.N.Y. Aug. 11, 2011). In May 2011, Mr. Rajaratnam, head fund manager and founder of Galleon Group, was
found guilty of five counts of conspiracy to commit securities fraud and nine counts of securities fraud after the SEC
initiated an investigation. Mr. Rajaratnam recently attempted to renew his motion for acquittal, however, his motion
was denied, in its entirety, as the court held that the government presented sufficient evidence that Mr. Rajaratnam
agreed to trade on the basis of inside information he had received from several sources.
14
Business Crime, 17.14, Criminal Penalties under the 1933 and 1934 Acts, p 1
criminal prosecutions come under Section 17(a) of the Securities Act of 193315
, Section 10(b) of
the Securities Exchange Act of 193416
, and Rule 10b-517
. Although complex, prosecutors only
have to prove that a defendant who violated a securities fraud provision had a general wrongful
purpose, where mail and wire fraud provisions require proof of specific intent.18
While
prosecutors run the risk of confusing juries, charging under these statutes is sometimes preferred
for several reasons. The level of intent required for a securities fraud violation is proof of a
general wrongful purpose, which also includes reckless conduct.19
Additionally, there is an
expansive body of civil case law that interprets the various provisions of the 1933 and 1934 Acts,
which are applicable to criminal litigation.20
IV. Defense Strategies
a. Elements
15
“It shall be unlawful for any person in the offer or sale of any securities by the use of any means or instruments of
transportation or communication in interstate commerce or by the use of mails, directly or indirectly,
(1) To employ any device, scheme, or artifice to defraud, or
(2) To obtain money or property by means of any untrue statement of a material fact or any omission to
state a material fact necessary in order to make the statements made, in the light of the circumstances
under which they were made, not misleading, or
(3) To engage in any transaction, practice or course of business which operates or would operate as a fraud
or deceit upon the purchaser.”
15 U.S.C.§ 77q(a)
16
“It shall be unlawful for any person, directly or indirectly, by the use of any means or instrumentality of interstate
commerce or of the mails, or of any facility of any national securities exchange…
(b) to use or employ, in connection with the purchase or sale of any security registered on a national
securities exchange or any security not so registered, any manipulative or deceptive device or contrivance in
contravention of such rules and regulations as the Commission may prescribe as necessary or appropriate in the
public interest for the protection of investors.”
15 U.S.C. § 78j(b)
17
“It shall be unlawful for any person, directly or indirectly, by the use of any means or instrumentality or interstate
commerce or of the mails, or of any facility of any national securities exchange
(a) To employ any device, scheme, or artifice to defraud,
(b) To make any untrue statement of a material fact or to omit to state a material fact necessary in order to
make statements made, in light of the circumstances under which they are made, not misleading, or
(c) To engage in any act, practice, or course of business which operates or would operate as a fraud or
deceit upon any person, in connection with the purchase or sale of any security.
17 C.F.R. § 240.10b-5
18
United States v. Dixon, 536 F. 2d 1388, 1395 (2d Cir. 1976) (holding that it is sufficient that the defendant realize
he was doing a wrongful act); United States v. Yeager, 521 F. 3d 367, 374 (5th Cir. Tex. 2008) (using insider trading
information in making trades is not an element of securities fraud).
19
Id.
20
4-17 Business Crime P 17.11, p2; see e.g. United States v. Charnay, 537 F.2d 341, 348 (9th Cir. 1976).
For a prosecutor to prove his or her case under the three statutes, the prosecutor has to
show (1) that there was substantial fraudulent activity21
, (2) involving the offer, purchase or sale
of securities (3) by use of interstate commerce or the mails.
b. Strategies
It is important to understand what law your client is being charged with having
violated. The most common defense strategy has been to focus on the relative complexity of the
securities laws and portray misconduct as a technical violation, committed without fraudulent
design or intent.22
However, it is common for prosecutors to come back at this defense,
depicting the defendant as a clever, sophisticated crook.23
The defendant’s wrongful conduct
consisted of solely administrative tasks, such as executing unsolicited orders or other routine
brokerage services, which do not amount to substantial assistance, as required by the statute. 24
In United States v. Lucarelli25
, the defendant was entitled to judgment of acquittal as to
convictions of securities fraud based on scheme to illegally obtain shares of bank during its
conversion to charged capital stock savings bank, because jury’s answer to special interrogatory
found that the defendant did not have the specific intent to defraud, which was a necessary
element of this crime.
Another commonly used defense, although challenging, is the reliance of advice of
counsel defense. A defendant may assert that he or she relied on the advice of counsel in
concluding that she or he was either not selling securities, or that, if he or she was, he or she was
21
Inclusive of one of the three types of fraudulent activity listed in Section 17(a) of the Securities Act of 1933,
Section 10(b) of the Securities Exchange Act of 1934, or Rule 10b-5, and this misrepresentation or fraud must be
material. The materiality of a misrepresentation “is judged by its potential effect on the decision its recipient makes
about his or her securities transactions.” 4-17 Business Crime P 17.11, p 3.
22
3-56 Criminal Defense Techniques 56.02, p 7
23
Id.
24
United States v. Kessi, 868 F. 2d 1097, 1104 (9th Cir. 1989)
25
490 F. Supp. 2d 295 (D. Conn. 2007)
not required to register these securities.26
However, where a client was not truthful and
comprehensive in his or her disclosure to counsel, this defense is not available.27
Unlike many other criminal statutes, defense attorneys in securities fraud allegations may
assert that the defendant was ignorant of the law. However, this defense may not always be
successful. In United States v. Wolfson28
, the defendant, the largest shareholder in the
corporation, exercising dominant control over the corporation’s operations and policies, asserted
that he was too preoccupied with the larger affairs of his business to focus on technical
requirements, and that he left it to his brokers to bring requirements to his attention. Mr.
Wolfson was found guilty, and the Court of Appeals stated that “the jury rejected this defense, if
indeed it is any defense at all.”29
A defendant may also assert a defense of compliance with professional standards. It is
argued that this compliance takes account of the professionals’ conflicting duties to both their
clients and the public that only professional rules can properly resolve and ought to constitute a
total defense to criminal prosecution under the Securities Acts of 1933 and 1934.30
Again, this
defense does not always hold up. In United States v. Simon,31
the court held that while evidence
of private rules govern a profession are admissible in rebutting criminal intent, proof of
compliance with these rules does not necessarily constitute a defense.
26
4-17 Business Crime P 17.11, p17
27
Id., United States v. United Med. And Surgical Supply Corp., 989 F. 2d 1390, 1403-1404 (4th Cir. 1993); SEC v.
McNamee, 481 F. 3d 451, 456 (7th Cir. 2007).
28
Id., see also 405 F. 2d 779 (2d Cir. 1968).
29
Id., at 782.
30
4-17 Business Crime P 17.11, p22
31
Id., see also United States v. Simon, 425 F. 2d 796 (2d Cir. 1969).
V. Conclusion
Although securities laws are complex, they are not impossible to master. Defense
attorneys should spend significant time navigating the law before they contemplate actual
defenses, and must do research to determine which circuits are most favorable to particular
defenses.

More Related Content

What's hot

ROYAL INTERNATIONAL COURT OF JUSTICE
ROYAL INTERNATIONAL COURT OF JUSTICE ROYAL INTERNATIONAL COURT OF JUSTICE
ROYAL INTERNATIONAL COURT OF JUSTICE
ICJ-ICC
 
Nebraska statutory requirements
Nebraska statutory requirementsNebraska statutory requirements
Nebraska statutory requirementslwilke
 
Presentation on POCA Jamaica
Presentation on POCA JamaicaPresentation on POCA Jamaica
Presentation on POCA Jamaica
LeadAdvocate
 
The Constitution is an Enforceable Contract
The Constitution is an Enforceable ContractThe Constitution is an Enforceable Contract
The Constitution is an Enforceable Contract
able1appeal
 
Schmalleger, The Bill of Rights
Schmalleger, The Bill of RightsSchmalleger, The Bill of Rights
Schmalleger, The Bill of Rights
Gregory Riley, Sr.
 
149015853 publ international-law
149015853 publ international-law149015853 publ international-law
149015853 publ international-law
homeworkping4
 
Article iii mfa
Article iii mfaArticle iii mfa
Article iii mfa
Michael Alzona
 
The Bill Of Rights Worksheet
The Bill Of Rights WorksheetThe Bill Of Rights Worksheet
The Bill Of Rights Worksheetdebatebaione
 
Cases in public international law
Cases in public international lawCases in public international law
Cases in public international law
jose maria jude duremdes
 
All People's Congress v NASMOS, Supreme Court of Sierra Leone, 26 October 1999
All People's Congress v NASMOS, Supreme Court of Sierra Leone, 26 October 1999All People's Congress v NASMOS, Supreme Court of Sierra Leone, 26 October 1999
All People's Congress v NASMOS, Supreme Court of Sierra Leone, 26 October 1999
Tony Kinnear
 
149016478 case-digest-tiongson-angelique-bien
149016478 case-digest-tiongson-angelique-bien149016478 case-digest-tiongson-angelique-bien
149016478 case-digest-tiongson-angelique-bien
homeworkping4
 
Doctrin of Renvoi
Doctrin of RenvoiDoctrin of Renvoi
Doctrin of Renvoi
carolineelias239
 

What's hot (17)

USA Patriot Act
USA Patriot ActUSA Patriot Act
USA Patriot Act
 
ROYAL INTERNATIONAL COURT OF JUSTICE
ROYAL INTERNATIONAL COURT OF JUSTICE ROYAL INTERNATIONAL COURT OF JUSTICE
ROYAL INTERNATIONAL COURT OF JUSTICE
 
Public international law cases
Public international law casesPublic international law cases
Public international law cases
 
Bill of rights_lesson
Bill of rights_lessonBill of rights_lesson
Bill of rights_lesson
 
Nebraska statutory requirements
Nebraska statutory requirementsNebraska statutory requirements
Nebraska statutory requirements
 
Presentation on POCA Jamaica
Presentation on POCA JamaicaPresentation on POCA Jamaica
Presentation on POCA Jamaica
 
The Constitution is an Enforceable Contract
The Constitution is an Enforceable ContractThe Constitution is an Enforceable Contract
The Constitution is an Enforceable Contract
 
Schmalleger, The Bill of Rights
Schmalleger, The Bill of RightsSchmalleger, The Bill of Rights
Schmalleger, The Bill of Rights
 
149015853 publ international-law
149015853 publ international-law149015853 publ international-law
149015853 publ international-law
 
Article iii mfa
Article iii mfaArticle iii mfa
Article iii mfa
 
The Bill Of Rights Worksheet
The Bill Of Rights WorksheetThe Bill Of Rights Worksheet
The Bill Of Rights Worksheet
 
Extradition ppt
Extradition pptExtradition ppt
Extradition ppt
 
Cases in public international law
Cases in public international lawCases in public international law
Cases in public international law
 
All People's Congress v NASMOS, Supreme Court of Sierra Leone, 26 October 1999
All People's Congress v NASMOS, Supreme Court of Sierra Leone, 26 October 1999All People's Congress v NASMOS, Supreme Court of Sierra Leone, 26 October 1999
All People's Congress v NASMOS, Supreme Court of Sierra Leone, 26 October 1999
 
149016478 case-digest-tiongson-angelique-bien
149016478 case-digest-tiongson-angelique-bien149016478 case-digest-tiongson-angelique-bien
149016478 case-digest-tiongson-angelique-bien
 
Theft
TheftTheft
Theft
 
Doctrin of Renvoi
Doctrin of RenvoiDoctrin of Renvoi
Doctrin of Renvoi
 

Viewers also liked

Training certificate on Risk Assessment and Risk Management
Training certificate on Risk Assessment and Risk ManagementTraining certificate on Risk Assessment and Risk Management
Training certificate on Risk Assessment and Risk Managementamp09
 
Nhức Lưng Là Bệnh Gì
Nhức Lưng Là Bệnh GìNhức Lưng Là Bệnh Gì
Nhức Lưng Là Bệnh Gìbryant190
 
Herramientas online para realizar carteles
Herramientas online para realizar cartelesHerramientas online para realizar carteles
Herramientas online para realizar carteles
reylion56
 
Reflexión diaria y diario de procesos
Reflexión diaria y diario de procesosReflexión diaria y diario de procesos
Reflexión diaria y diario de procesosvilmasalgadoo
 
Capitulo 27 (XML: Lenguaje de mercado extendible) y Capítulo 28 (Conceptos de...
Capitulo 27 (XML: Lenguaje de mercado extendible) y Capítulo 28 (Conceptos de...Capitulo 27 (XML: Lenguaje de mercado extendible) y Capítulo 28 (Conceptos de...
Capitulo 27 (XML: Lenguaje de mercado extendible) y Capítulo 28 (Conceptos de...
Liz Ocampo
 
στο Χριστό στο κάστρο
στο Χριστό στο κάστροστο Χριστό στο κάστρο
στο Χριστό στο κάστρο
Katerina Kapetaniou
 
Autoevaluación on line sobre morfemas y fonemas.
Autoevaluación on line sobre morfemas y fonemas.Autoevaluación on line sobre morfemas y fonemas.
Autoevaluación on line sobre morfemas y fonemas.
Irenia Díaz
 
صلاة الجماعة
صلاة الجماعةصلاة الجماعة
صلاة الجماعة
mohamed_rds
 
Presenting Tesla Model S, the smartest car on earth (+ Tesla Auto Pilot)
Presenting Tesla Model S, the smartest car on earth (+ Tesla Auto Pilot)Presenting Tesla Model S, the smartest car on earth (+ Tesla Auto Pilot)
Presenting Tesla Model S, the smartest car on earth (+ Tesla Auto Pilot)
Byron Soulopoulos
 
Role playing aula de Geografía e Historia
Role playing aula de Geografía e HistoriaRole playing aula de Geografía e Historia
Role playing aula de Geografía e HistoriaDiego Sobrino López
 

Viewers also liked (11)

Training certificate on Risk Assessment and Risk Management
Training certificate on Risk Assessment and Risk ManagementTraining certificate on Risk Assessment and Risk Management
Training certificate on Risk Assessment and Risk Management
 
Nhức Lưng Là Bệnh Gì
Nhức Lưng Là Bệnh GìNhức Lưng Là Bệnh Gì
Nhức Lưng Là Bệnh Gì
 
Herramientas online para realizar carteles
Herramientas online para realizar cartelesHerramientas online para realizar carteles
Herramientas online para realizar carteles
 
Reflexión diaria y diario de procesos
Reflexión diaria y diario de procesosReflexión diaria y diario de procesos
Reflexión diaria y diario de procesos
 
Perez tp2
Perez tp2Perez tp2
Perez tp2
 
Capitulo 27 (XML: Lenguaje de mercado extendible) y Capítulo 28 (Conceptos de...
Capitulo 27 (XML: Lenguaje de mercado extendible) y Capítulo 28 (Conceptos de...Capitulo 27 (XML: Lenguaje de mercado extendible) y Capítulo 28 (Conceptos de...
Capitulo 27 (XML: Lenguaje de mercado extendible) y Capítulo 28 (Conceptos de...
 
στο Χριστό στο κάστρο
στο Χριστό στο κάστροστο Χριστό στο κάστρο
στο Χριστό στο κάστρο
 
Autoevaluación on line sobre morfemas y fonemas.
Autoevaluación on line sobre morfemas y fonemas.Autoevaluación on line sobre morfemas y fonemas.
Autoevaluación on line sobre morfemas y fonemas.
 
صلاة الجماعة
صلاة الجماعةصلاة الجماعة
صلاة الجماعة
 
Presenting Tesla Model S, the smartest car on earth (+ Tesla Auto Pilot)
Presenting Tesla Model S, the smartest car on earth (+ Tesla Auto Pilot)Presenting Tesla Model S, the smartest car on earth (+ Tesla Auto Pilot)
Presenting Tesla Model S, the smartest car on earth (+ Tesla Auto Pilot)
 
Role playing aula de Geografía e Historia
Role playing aula de Geografía e HistoriaRole playing aula de Geografía e Historia
Role playing aula de Geografía e Historia
 

Similar to Defending Securities Fraud

Cpcu 530 chapter 4 acts & ucc
Cpcu 530 chapter 4 acts & uccCpcu 530 chapter 4 acts & ucc
Cpcu 530 chapter 4 acts & uccDonna Kesot
 
Cpcu 530 chapter 4 acts & ucc
Cpcu 530 chapter 4 acts & uccCpcu 530 chapter 4 acts & ucc
Cpcu 530 chapter 4 acts & uccDonna Kesot
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crimerharrisonaz
 
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docxCHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
spoonerneddy
 
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docxCHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
tiffanyd4
 
Amanda N. Miller, Esq. Commodities Manipulation Article - Published
Amanda N. Miller, Esq. Commodities Manipulation Article - PublishedAmanda N. Miller, Esq. Commodities Manipulation Article - Published
Amanda N. Miller, Esq. Commodities Manipulation Article - PublishedAmanda N. Miller
 
Update your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActUpdate your NDA to include the new DTSA Act
Update your NDA to include the new DTSA Act
EveryNDA
 
Ph consti-compilations (1)
Ph consti-compilations (1)Ph consti-compilations (1)
Ph consti-compilations (1)
IANBRUCELIGARAY
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAWChirine Haddad ?
 
The uniform trade secrets act
The uniform trade secrets actThe uniform trade secrets act
The uniform trade secrets act
Bhadra Gowdra
 
Lindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_ArticleLindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_ArticleLindsay Boyd
 
Compare and contrast the theories of liability for insider trading u.pdf
Compare and contrast the theories of liability for insider trading u.pdfCompare and contrast the theories of liability for insider trading u.pdf
Compare and contrast the theories of liability for insider trading u.pdf
aishwaryaequipment
 
The Defend Trade Secrets Act of 2016
The Defend Trade Secrets Act of 2016The Defend Trade Secrets Act of 2016
The Defend Trade Secrets Act of 2016
CohenGrigsby
 
Confidential Informant Darren Chaker
Confidential Informant Darren ChakerConfidential Informant Darren Chaker
Confidential Informant Darren Chaker
Darren Chaker
 
York County, Virginia General District Court Filing Traffic Court
York County, Virginia General District Court Filing   Traffic CourtYork County, Virginia General District Court Filing   Traffic Court
York County, Virginia General District Court Filing Traffic Court
Chuck Thompson
 
What You Need to Know About Insider Trading
What You Need to Know About Insider TradingWhat You Need to Know About Insider Trading
What You Need to Know About Insider Trading
Paul Hastings
 
Belo Presentation 020909
Belo Presentation 020909Belo Presentation 020909
Belo Presentation 020909
jmlittle68
 
Presentation on Effect and Application of Laws
Presentation on Effect and Application of LawsPresentation on Effect and Application of Laws
Presentation on Effect and Application of Laws
TimmyGrace2
 
Unclean-Hands-Darren-Chaker
Unclean-Hands-Darren-ChakerUnclean-Hands-Darren-Chaker
Unclean-Hands-Darren-Chaker
Darren Chaker
 

Similar to Defending Securities Fraud (20)

Cpcu 530 chapter 4 acts & ucc
Cpcu 530 chapter 4 acts & uccCpcu 530 chapter 4 acts & ucc
Cpcu 530 chapter 4 acts & ucc
 
Cpcu 530 chapter 4 acts & ucc
Cpcu 530 chapter 4 acts & uccCpcu 530 chapter 4 acts & ucc
Cpcu 530 chapter 4 acts & ucc
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
 
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docxCHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
 
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docxCHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
 
Amanda N. Miller, Esq. Commodities Manipulation Article - Published
Amanda N. Miller, Esq. Commodities Manipulation Article - PublishedAmanda N. Miller, Esq. Commodities Manipulation Article - Published
Amanda N. Miller, Esq. Commodities Manipulation Article - Published
 
Update your NDA to include the new DTSA Act
Update your NDA to include the new DTSA ActUpdate your NDA to include the new DTSA Act
Update your NDA to include the new DTSA Act
 
Ph consti-compilations (1)
Ph consti-compilations (1)Ph consti-compilations (1)
Ph consti-compilations (1)
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
 
The uniform trade secrets act
The uniform trade secrets actThe uniform trade secrets act
The uniform trade secrets act
 
Lindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_ArticleLindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_Article
 
Mortgagenotes
MortgagenotesMortgagenotes
Mortgagenotes
 
Compare and contrast the theories of liability for insider trading u.pdf
Compare and contrast the theories of liability for insider trading u.pdfCompare and contrast the theories of liability for insider trading u.pdf
Compare and contrast the theories of liability for insider trading u.pdf
 
The Defend Trade Secrets Act of 2016
The Defend Trade Secrets Act of 2016The Defend Trade Secrets Act of 2016
The Defend Trade Secrets Act of 2016
 
Confidential Informant Darren Chaker
Confidential Informant Darren ChakerConfidential Informant Darren Chaker
Confidential Informant Darren Chaker
 
York County, Virginia General District Court Filing Traffic Court
York County, Virginia General District Court Filing   Traffic CourtYork County, Virginia General District Court Filing   Traffic Court
York County, Virginia General District Court Filing Traffic Court
 
What You Need to Know About Insider Trading
What You Need to Know About Insider TradingWhat You Need to Know About Insider Trading
What You Need to Know About Insider Trading
 
Belo Presentation 020909
Belo Presentation 020909Belo Presentation 020909
Belo Presentation 020909
 
Presentation on Effect and Application of Laws
Presentation on Effect and Application of LawsPresentation on Effect and Application of Laws
Presentation on Effect and Application of Laws
 
Unclean-Hands-Darren-Chaker
Unclean-Hands-Darren-ChakerUnclean-Hands-Darren-Chaker
Unclean-Hands-Darren-Chaker
 

Defending Securities Fraud

  • 1. Defending Securities Fraud: A Brief Description of the Law, Elements, and Defense Techniques By: Amanda Whitt I. What is Securities Fraud? Courts broadly interpret federal securities laws.1 The Securities laws of the 1930s were enacted to redress several perceived problems in the securities market place.2 These laws were created to promote full and fair disclosure of material information, and therefore, attempt to remedy the problems that led up to the stock market crash.3 The Securities Acts allow marketplace forces to determine the quality of the securities offered and the reasonableness of the prices and terms at which they trade.4 Essentially, securities laws are anti-fraud statutes. Therefore, while civil remedies are available, willful violations of these Acts may result in criminal prosecutions as a violation is considered to be a fraud against society.5 II. Securities Defined Section 2(a) (1) of the Securities Act of 1933 defines a ‘security’ as: any note, stock, treasury stock, security future, bond, debenture, evidence of indebtedness, certificate of interest or participation in any profit-sharing agreement, collateral-trust certificate, reorganization certificate or subscription, transferable share, investment contract, voting-trust certificate, certificate of deposit for a security, fractional undivided interest in oil, gas, or other mineral rights, any put, call, straddle, option, or privilege on any security, certificate of deposit, or group or index of securities (including any interest therein or based on the value thereof), or any put, call, straddle, option, or privilege entered into on a national securities exchange relating to foreign currency, or, in 1 4-17 Business Crime p 17.11, citing Superintendant of Ins. of N.Y. v. Bankers Life & Cas. Co., 404 U.S. 6 (1971); United States v. Russo, 74 F. 3d 1383 (2d Cir. 1996); Madden v. Cowen & Co., 556 F. 3d 786 (9th Cir. Cal. 2009). 2 3-56 Criminal Defense Techniques § 56.02, p1 3 3-56 Criminal Defense Techniques §56.02, p 2 4 3-56 Criminal Defense Techniques §56.02, p 2, citing Bentel v. United States, 13 F. 3d 327 5 Id.
  • 2. general, any interest or instrument commonly known as a “security”, or any certificate of interest or participation in, temporary or interim certificate for, receipt for, guarantee of, or warrant or right to subscribe to or purchase, any of the foregoing. 15 USC 78c (10). With the definition encompassing so many things, it is clear as to why the courts have understood Congress to have intended an expansive definition of “security”.6 Federal securities regulatory laws are contained within six statutes: (1) The Securities Act of 1933, codified at 15 U.S.C. 77a et seq; controlling the registration of public securities offerings and requiring extensive disclosure of relevant information relating to these offerings; (2) The Securities Exchange Act of 1934, codified at 15 U.S.C. Section 78a et seq.; governing trading on national securities exchanges and in the over-the-counter market and requiring the registration of brokers and dealers; (3) The Public Utility Holding Company Act of 1935, codified at 15 U.S.C. 79a et seq.; regulating public companies and their subsidiaries engaged in electrical and gas utility businesses; (4) The Trust Indenture Act of 1939, codified at 15 U.S.C. 77aaa et seq., governing debt securities; (5) The Investment Company Act of 1939, codified at 15 U.S.C. 80a-1 et seq., regulating companies whose primary business is owning or trading securities; and (6) The Investment Advisers Act of 1940, codified at 15 U.S.C. 80b-1, et seq., regulating investment advisers. 7 Along with these six regulatory statutes, securities related conduct is also contained in various criminal statutes, including mail and wire fraud statutes8 , criminal RICO9 , conspiracy and aiding and abetting liability10 , obstruction of justice, and perjury and false statements statutes11 . 6 The Supreme Court, in Marine Bank v. Weaver, 455 U.S. 551, (1982), construing the virtually identical definition of “security” under the Securities Exchange Act of 1934, the definition is “quite broad” and meant to include “the many types of instruments that in our commercial world fall within the ordinary concept of a security,” including “stocks and bonds, along with the countless and variable schemes devised by those who seek the use of the money of others on the promise of profits.” Weaver, 455 U.S. at 555. 7 3-56 Criminal Defense Techniques, §56.02, p. 1 8 18 USC 1348, the securities and commodities fraud statute, makes it a crime for anyone who knowingly executes, or attempts to execute, a scheme or artifice to defraud any person in connection with any commodity for future delivery, or any option on a commodity for future delivery, or any security of an issuer with a class of securities that is registered under section 12 of the Securities Exchange Act of 1934 (15 USC 78l) or that is required to file reports under section 15(d) of the Securities Exchange Act of 1934 (15 USC 78o(d)) OR by means of false or fraudulent pretenses,
  • 3. III. Criminal Penalties under 1933 and 1934 Acts There has been a sharp increase in criminal enforcement, especially with respect to insider trading cases, since the late seventies.12 Federal prosecutions are frequently derived from SEC enforcement actions, which should be a cautionary note to defense attorneys. An SEC investigation will likely result in criminal prosecution, with potential fines, as well as possible incarceration.13 Each violation of the 1934 Act results in various penalties,14 therefore, it is wise for the criminal defense attorney to understand each section of the 1933 and 1934 Acts before undertaking the defense of a client charged with a securities fraud violation. The majority of representations, or promises, any money or property in connection with the purchase or sale of any commodity for future delivery, or any security of an issuer with a class of securities registered under section 12 of the Securities Exchange Act of 1934 (15 USC 78l) or that is required to file reports under section 15(d) of the Securities Exchange Act of 1934 (15 USC 78o(d)). 18 U.S.C. 1348. Provisions of 18 USC 1348 were modeled on provisions of mail and wire fraud statutes as set forth in 18 USC 341 and 343; therefore, courts have held that the government was required to shore some intent to harm victims. United States v. Motz, 632 F. Supp. 2d 284. 9 3-56 Criminal Defense Techniques § 56.02, 18 U.S.C. § 1961(1)(D); 18 U.S.C. § 1961(1)(B) 10 Id., 18 U.S.C. § 2, however, there is a commonly used defense technique when defendants are charged with aiding and abetting securities fraud. Defense attorneys commonly argue (1) that there was no underlying securities violation; and (2) that the alleged aider or abettor did not have the requisite knowledge of the infraction. United States v. Kessi, 868 F. 2d 1097, 1104 (9th Cir. 1989). 11 Id., 18 U.S.C. §§ 1621, 1623; 18 U.S.C. § 1503; 18 U.S.C. § 100. A cautionary note for defense attorneys though; for the government to charge under a false statements or obstruction of justice statute, the faulty information does not need to be material in order to violate the statutes, whereas in a securities fraud violation, materiality is an element of the offense. 3-56 Criminal Defense Techniques § 56.02, citing United States v. Ruggiero, 934 F. 2d 440, 446 (2d Cir. 1991) (likewise, for a defendant to be charged with obstruction of justice, his endeavor to obstruct need not be successful). 3-56 Criminal Defense Techniques § 56.02, citing United States v. Russell, 255 U.S. 138, 143 (1921). Although indicted with false statements and perjury, Martha Stewart was brought in front of the grand jury initially as an insider trading witness. United States v. Stewart, 433 F. 3d 273 (2d Cir. 2006). 12 See 4-17 Business Crime P. 17.11, note 2, “these statistics are based on a review of the Annual Securities and Exchange Commission Reports to Congress, for the years of 1982 through 1997.” 13 Note the recent case gaining national recognition, United States v. Rajaratnam, 2011 U.S. Dist. LEXIS 91365 (S.D.N.Y. Aug. 11, 2011). In May 2011, Mr. Rajaratnam, head fund manager and founder of Galleon Group, was found guilty of five counts of conspiracy to commit securities fraud and nine counts of securities fraud after the SEC initiated an investigation. Mr. Rajaratnam recently attempted to renew his motion for acquittal, however, his motion was denied, in its entirety, as the court held that the government presented sufficient evidence that Mr. Rajaratnam agreed to trade on the basis of inside information he had received from several sources. 14 Business Crime, 17.14, Criminal Penalties under the 1933 and 1934 Acts, p 1
  • 4. criminal prosecutions come under Section 17(a) of the Securities Act of 193315 , Section 10(b) of the Securities Exchange Act of 193416 , and Rule 10b-517 . Although complex, prosecutors only have to prove that a defendant who violated a securities fraud provision had a general wrongful purpose, where mail and wire fraud provisions require proof of specific intent.18 While prosecutors run the risk of confusing juries, charging under these statutes is sometimes preferred for several reasons. The level of intent required for a securities fraud violation is proof of a general wrongful purpose, which also includes reckless conduct.19 Additionally, there is an expansive body of civil case law that interprets the various provisions of the 1933 and 1934 Acts, which are applicable to criminal litigation.20 IV. Defense Strategies a. Elements 15 “It shall be unlawful for any person in the offer or sale of any securities by the use of any means or instruments of transportation or communication in interstate commerce or by the use of mails, directly or indirectly, (1) To employ any device, scheme, or artifice to defraud, or (2) To obtain money or property by means of any untrue statement of a material fact or any omission to state a material fact necessary in order to make the statements made, in the light of the circumstances under which they were made, not misleading, or (3) To engage in any transaction, practice or course of business which operates or would operate as a fraud or deceit upon the purchaser.” 15 U.S.C.§ 77q(a) 16 “It shall be unlawful for any person, directly or indirectly, by the use of any means or instrumentality of interstate commerce or of the mails, or of any facility of any national securities exchange… (b) to use or employ, in connection with the purchase or sale of any security registered on a national securities exchange or any security not so registered, any manipulative or deceptive device or contrivance in contravention of such rules and regulations as the Commission may prescribe as necessary or appropriate in the public interest for the protection of investors.” 15 U.S.C. § 78j(b) 17 “It shall be unlawful for any person, directly or indirectly, by the use of any means or instrumentality or interstate commerce or of the mails, or of any facility of any national securities exchange (a) To employ any device, scheme, or artifice to defraud, (b) To make any untrue statement of a material fact or to omit to state a material fact necessary in order to make statements made, in light of the circumstances under which they are made, not misleading, or (c) To engage in any act, practice, or course of business which operates or would operate as a fraud or deceit upon any person, in connection with the purchase or sale of any security. 17 C.F.R. § 240.10b-5 18 United States v. Dixon, 536 F. 2d 1388, 1395 (2d Cir. 1976) (holding that it is sufficient that the defendant realize he was doing a wrongful act); United States v. Yeager, 521 F. 3d 367, 374 (5th Cir. Tex. 2008) (using insider trading information in making trades is not an element of securities fraud). 19 Id. 20 4-17 Business Crime P 17.11, p2; see e.g. United States v. Charnay, 537 F.2d 341, 348 (9th Cir. 1976).
  • 5. For a prosecutor to prove his or her case under the three statutes, the prosecutor has to show (1) that there was substantial fraudulent activity21 , (2) involving the offer, purchase or sale of securities (3) by use of interstate commerce or the mails. b. Strategies It is important to understand what law your client is being charged with having violated. The most common defense strategy has been to focus on the relative complexity of the securities laws and portray misconduct as a technical violation, committed without fraudulent design or intent.22 However, it is common for prosecutors to come back at this defense, depicting the defendant as a clever, sophisticated crook.23 The defendant’s wrongful conduct consisted of solely administrative tasks, such as executing unsolicited orders or other routine brokerage services, which do not amount to substantial assistance, as required by the statute. 24 In United States v. Lucarelli25 , the defendant was entitled to judgment of acquittal as to convictions of securities fraud based on scheme to illegally obtain shares of bank during its conversion to charged capital stock savings bank, because jury’s answer to special interrogatory found that the defendant did not have the specific intent to defraud, which was a necessary element of this crime. Another commonly used defense, although challenging, is the reliance of advice of counsel defense. A defendant may assert that he or she relied on the advice of counsel in concluding that she or he was either not selling securities, or that, if he or she was, he or she was 21 Inclusive of one of the three types of fraudulent activity listed in Section 17(a) of the Securities Act of 1933, Section 10(b) of the Securities Exchange Act of 1934, or Rule 10b-5, and this misrepresentation or fraud must be material. The materiality of a misrepresentation “is judged by its potential effect on the decision its recipient makes about his or her securities transactions.” 4-17 Business Crime P 17.11, p 3. 22 3-56 Criminal Defense Techniques 56.02, p 7 23 Id. 24 United States v. Kessi, 868 F. 2d 1097, 1104 (9th Cir. 1989) 25 490 F. Supp. 2d 295 (D. Conn. 2007)
  • 6. not required to register these securities.26 However, where a client was not truthful and comprehensive in his or her disclosure to counsel, this defense is not available.27 Unlike many other criminal statutes, defense attorneys in securities fraud allegations may assert that the defendant was ignorant of the law. However, this defense may not always be successful. In United States v. Wolfson28 , the defendant, the largest shareholder in the corporation, exercising dominant control over the corporation’s operations and policies, asserted that he was too preoccupied with the larger affairs of his business to focus on technical requirements, and that he left it to his brokers to bring requirements to his attention. Mr. Wolfson was found guilty, and the Court of Appeals stated that “the jury rejected this defense, if indeed it is any defense at all.”29 A defendant may also assert a defense of compliance with professional standards. It is argued that this compliance takes account of the professionals’ conflicting duties to both their clients and the public that only professional rules can properly resolve and ought to constitute a total defense to criminal prosecution under the Securities Acts of 1933 and 1934.30 Again, this defense does not always hold up. In United States v. Simon,31 the court held that while evidence of private rules govern a profession are admissible in rebutting criminal intent, proof of compliance with these rules does not necessarily constitute a defense. 26 4-17 Business Crime P 17.11, p17 27 Id., United States v. United Med. And Surgical Supply Corp., 989 F. 2d 1390, 1403-1404 (4th Cir. 1993); SEC v. McNamee, 481 F. 3d 451, 456 (7th Cir. 2007). 28 Id., see also 405 F. 2d 779 (2d Cir. 1968). 29 Id., at 782. 30 4-17 Business Crime P 17.11, p22 31 Id., see also United States v. Simon, 425 F. 2d 796 (2d Cir. 1969).
  • 7. V. Conclusion Although securities laws are complex, they are not impossible to master. Defense attorneys should spend significant time navigating the law before they contemplate actual defenses, and must do research to determine which circuits are most favorable to particular defenses.