How To Make A Million Bucks From Day Trading: A Ponzi Adventure

Harness the limitless loss-making potential of day traders for your next criminal enterprise!
Author:
Updated:
Original:
Getty Images

(Getty Images)

Today's financial markets provide innumerable outlets for enterprising souls to make a buck, so long as they have diligence or know-how or at least some good connections. Lacking any those qualities, there are always Ponzi schemes.

There’s one big problem with Ponzi schemes, though: They’re mathematically impossible to maintain. The expectation of compounding returns means continually seeking new investments at an exponential clip. Eventually the schemer hits a wall. For a Ponzi scheme to really work, then, one would have to attract clients into investments that were bound to lose money, and willingly.

It was only a matter of time before the market filled that niche. The innovation: harnessing the cash-blowing potential of mindless day traders. As outlined in an SEC criminal complaint this week, that was key to the model pioneered by a duo of business associates — Naris Chamroonrat of Bangkok and Adam Plumer of Las Vegas — who made a million bucks thanks to workaday schlubs trading stocks on their lunch breaks.

The scheme began as a legit business, Nonko Trading, an electronic day trading platform established by Chamroonrat in 2013. Like many prop-trading sites, Nonko had a training module where customers could practice in real time, with real stock quotes, using play money.

Chamroonrat’s innovation was to place investors on the training mode, called TRZ, but tell them they were trading actual stocks. Real money from real people flowed in, but the action was all simulated. Once the inevitably discouraged traders called it quits and cut their losses, Nonko would pocket the difference between their initial investment and the final balance, the SEC alleged. The whole scheme functioned by promising inexperienced traders exactly what they wanted: direct exposure to the market.

The trick was finding mugs. In 2014, prosecutors said, Chamroonrat enlisted Plumer to entice investors onto the site, armed with the promise of an impossibly low minimum deposit of $2,500 and a potential margin of 20:1, well above the legal limit.

“To ensure the scheme's success,” the complaint says, Chamroonrat “targeted traders who appeared inexperienced or unsophisticated, or had a history of trading losses.” For Plumer, that allegedly meant cold-calling potential marks. Those who appeared hapless and innocent enough to be certain losers were deemed “TRZ-valid” and allowed to bumble into the fake market. If they somehow hit a winning streak, Nonko would transfer them onto the real trading side.

Successful traders were a perennial source of concern. “What happens when they do make money?” Plumer asked Chamroonrat in a Skype chat, the complaint says. The response: “bump them off trz, put them on a real account give them more leverage in exchange for a profit split."

In order to allay concerns over trading “anomalies,” the two deployed a tapestry of securities-market jargon. According to the SEC, these included hand-wavy overtures to “alternative routing,” “internaliz[ation] by a wholesale desk,” and, naturally, the fact of their being on a “dark pool.”

Even so, cracks in the system emerged, leading to a fractious split with the contractor that had been providing TRZ’s virtual back-end. Chamroonrat hired a contractor to create a proprietary system, which they gave the convincing name of Logix, and the whole thing carried on as before. That is, until the SEC spoiled the fun.

In the course of less than two years, Nonko attracted $1.6 million from 260 investors, the SEC said. Over that time, fictitious trading losses amounted to $1.4 million, which was essentially money in the bank for Nonko.

As frauds go, the case the SEC lays out seems airtight. Nonko repeatedly promised investors they were using live ammunition when in fact they were shooting blanks. Losses weren’t accruing to some savvy Wall Street firm but to a bank account in Belize.

But as Ponzi schemes go – or “Ponzi-like,” in the SEC’s words – this one deserves note. It bypassed the central obstacle that all Ponzis face – the finitude of willing rubes – while giving investors precisely what they came for: an exciting way to fritter away their hard-earned cash. It’s a tenet of mainstream financial literacy that day trading is on net a losing proposition, yet millions continue to do it. Why should E*Trade be the only one to benefit?

The case is Securities and Exchange Commission v. Chamroonrat, et al, U.S. District Court, District of New Jersey, 2:16-cv-09403-KM-JBC.

Related

Miami Jeweler Busted in $40 Million Ponzi Scheme

Yet another South Florida mini-Madoff has been nabbed by the Securities and Exchange Commission for robbing unsuspecting investors out of their hard-earned cash. Luis Felipe Perez allegedly stole $40 million from 35 investors from 2006 through 2009 until his Ponzi scheme unraveled.

Former Online Brokerage Chief Offers Handy How-To-Guide Re: Getting Banned From The Securities Industry

Regardless of what you think of the Securities and Exchange Commission, a good rule of thumb is that if you are regulated by the agency, you probably don't want to go out of your way to unnecessarily insult and/or anger it. In fact, to play it safe, you might want to just show the place complete and total deference, whether you're violating its rules or not. This is an attitude that many a hedge fund manager has adopted over the years, some of their own volition, others by strong advisement. Then you have Sheldon Maschler. The former chief trader of Datek Online, who in 2003 paid a $29.2 million fine and was banned from the securities industry, took a different approach. From Wall Street Journal reporter Scott Patterson's new book, Dark Pools: During the hearings, Maschler displayed a stunning irrevenerce toward the regulators. One day, he showed up in bathing trunks and a T-shirt that read NASDAQ SUCKS. The judge, outraged, tossed him out, telling him to come back in a different shirt the following day. Maschler did as ordered-- wearing a T-shirt that read NASDAQ SUCKS in different colors. Regulators were quickly crawling all over Maschler's ragtag office. One day, a typical one in the market for Datek, each trader sat staring at his Watcher in Maschler's basement, all decked out in their standard work uniform-- baggy shorts, T-shirts, tennis shoes or flip-flops. Suddenly, they all noticed an odd presence in the room: two men in crisp suits looming over the stairwell door. Maschler exploded like a grenade. "Who...the FUCK...are YOU!" he screamed, jumping from his seat and jabbing his Macanudo in the air. "We're from the SEC," one of the suits said. "We're looking for Sheldon Maschler." "Who the FUCK let you in!" "The door was open." "If my fly was open, would you suck my dick?" The Datek traders buckled in their seats, struggling to contain their laughter. "Now get upstairs and RING THE FUCKING BELL!" Maschler roared. The two SEC officials sheepishly crept back upstairs-- and rang the bell. Maschler pressed the intercom buttom. "Hello, who is it?" he said calmly. There was a pause. Then, "It's the SEC." "Come on down!" Maschler greeted them warmly, all smiles, backslapping. "Now, wasn't that easier?" he said, waving around his Macanudo and blowing smoke into their faces.

SEC Staffers Have Made Remarkable Progress Re: Learning What Constitutes Appropriate Use Of A Work Computer

If you had asked us two years or two months or two days ago if we thought that there would be a time in the near future when Securities and Exchange employees would not be getting reprimanded for watching porn on their work-issued computers, we would have said absolutely not. No judgment, but in our professional opinion, people do not go from, among other things: * Receiving "over 16,000 access denials for Internet websites classified by the Commission's Internet filter as either "Sex" or "Pornography" in a one-month period" * Accessing "Internet pornography and downloading pornographic images to his SEC computer during work hours so frequently that, on some days, he spent eight hours accessing Internet pornography...downloading so much pornography to his government computer that he exhausted the available space on the computer hard drive and downloaded pornography to CDs or DVDs that he accumulated in boxes in his office." * www.ladyboyx.com, www.ladyboyjuice.com, www.trannytit.com, and www.anal-sins.com ...to living a porn-free existence at l'office. Did we think they'd take baby steps toward that goal sure? But when you've tried to log on to your websites of choice, on average, 533 times a day, assuming weekends were worked, baby steps means getting yourself to a place where you can do a solid two hours of work each week without hitting up anal-sins.com. So you can imagine (and probably share in) our surprise to hear that, according to a probe by Interim Inspector General Jon Rymer re: "misuses of government resources," the worst offenses one office was charged with claiming they needed iPads to do their jobs when really they just wanted to watch movies on them at home and going to hacker conferences without encrypting the data on their computers. Granted, it doesn't look so great that the group that was running around with computers that didn't even have anti-virus programs on their computers was the one that "is responsible for ensuring exchanges are following a series of voluntary guidelines...concerning computer audits, security, and capacity" but still, no ladyboyjuice while on the job-- that's huge. In a 43-page investigative report that probed the misuse of government resources, SEC Interim Inspector General Jon Rymer discovered that an office within the SEC's Trading and Markets division spent over $1 million on unnecessary technology. The report also found that the staffers failed to protect their computers and devices from hackers, even as they were urging exchanges and clearing agencies to do just that. Although no breaches occurred, the staffers left sensitive stock exchange data exposed to potential cyber attacks because they failed to encrypt the devices or even install basic virus protection programs...On Friday Reuters reviewed a copy of the full report, which details an even broader array of problems, from misleading the SEC about the office's need to buy Apple Inc products, to cases in which staffers took iPads and laptops home and used them primarily for pursuits such as personal banking, surfing the Web and downloading music and movies. The report says the staff may have brought the unprotected laptops to a Black Hat convention where hacking experts discuss the latest trends. They also used them to tap into public wireless networks and brought the devices along with them during exchange inspections...The report also found that some people who worked in the office had little or no experience with exchange technical matters. SEC staffers used govn't computers for personal use - report [Reuters] Earlier: SEC Supervisor Surfed Tranny Porn To Cope With Stress Of The Job; SEC Official Who Surfed Tranny Porn To Deal With Stress Of The Job– Not Alone!;