Two Madoff computer admins indicted
Pair charge accused falsifying financial records
Computerworld - Two former computer administrators who worked for convicted financial fraudster Bernard Madoff's investment firm were indicted this week on charges of conspiracy and falsifying financial records.
Jerome O'Hara, 47, of Malverne, N.Y., and George Perez , 44, of East Brunswick, N.J., each face a maximum of 30 years in prison if convicted on all charges.
A statement released yesterday by the U.S. Attorney's office for the Southern District of New York said the two men started working for Bernard L. Madoff Investment Securities, LLC (BLMIS) in the early 1990s. Both O'Hara and Perez were responsible for maintaining computer programs that supported Madoff's investment advisory business.
Between 2003 and 2008, Madoff's company's books were reviewed five times by the U.S. Securities and Exchange Commission and a European accounting firm that was conducting a review of the company on behalf of a European client.
O'Hara and Perez are alleged to have helped Madoff and his aide, Frank DiPascali, generate "numerous false and fraudulent records" to deceive investigators during the reviews.
Both men are alleged to have known that the "special programs" they developed were generating fraudulent information, the statement said.
Madoff is serving a 150-year prison term after pleading guilty to running a massive Ponzi scheme that bilked investors out of billions of dollars over a period of several years.
DiPascali, who pleaded guilty to helping Madoff in the scheme, is awaiting sentencing. He faces up to 125 years in prison.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Security in Computerworld's Security Topic Center.
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!