Zero-Day Post-Trade Analysis Won’t Stop the Front Runners

On July 19, U.S. authorities arrested HSBC Holdings PLC’s global head of foreign exchange cash trading for his involvement in a series of trades effected in December 2011. The trades in question are nothing more than front-running. Here’s the gist of what happened:

Cairn Energy, a UK-listed oil and gas producer, approached HSBC in 2011 to convert $3.5 billion in proceeds from the sale of an Indian subsidiary to pounds. With the knowledge of a large buyer entering the market for sterling, the HSBC foreign exchange desk engaged in aggressive buying in the days and hours leading up to the conversion. On the day of the conversion, the HSBC desk liquidated their position generating $3 million in profits for the bank on top of the $5 million in fees tied to the client’s transaction.

I have no idea whether or not these trades were flagged by internal surveillance teams and simply swept under the rug, but I can assure you that this type of activity, combined with such a serious breach of client confidentiality, is very detectable with the right tool set.

So what is the right tool set? One that doesn’t focus on zero-day analysis.

Zero-day refers to the number of days between the time a trade is effected and some external event (like a client’s pending currency conversion). The post-trade analysis on the day of the currency conversion likely didn’t raise any questions. You have an FX desk selling out of pounds and a client buying into pounds. This is exactly what you would expect. But what did the days leading up to the conversion look like?

Probably something like this:

Source: Ascendant Compliance Manager

This is an example of a 3-month rolling volume profile analysis where the light blue line represents the FX client trades and the dark blue line represents HSBC trades in the cash market for GBP. It is evident that a pattern of escalating bank trades emerges shortly after Cairn Energy approached HSBC. If rolling volume profiles were put in front of a trading surveillance analyst in real-time each day, this most certainly would have raise a red flag.

Of course, this is a very simplified example. The complexity of the bank’s FX transactions surrounding this event would require a more sophisticated analysis, and potentially, the analysis of trades in other markets. But in an event like this, one thing is certain – it is impossible to rely on systems that ignore the tremendous amount of data available to us in the transaction history. Post-trade analysis that begins and ends with the days trading activity is simply ineffective.

Latest Content

Ascendant’s Jason Morton to Speak on RegTech at Strata Data Conference

Alongside technology experts from American Express, Credit Suisse and CIBC, Ascendant’s Jason Morton will speak on developments in regulatory technology at the ‘Fintech Data Day’ at the annual Strata Data Conference on September 26, 2017 in New York. The Strata Data Conference is an annual conference for technology and business professionals who are seeking innovative … Continued

Hurricane Season: How Does your BCM Program Stack Up?

As Hurricane Harvey touches down on U.S. soil and we hope for the safety of the millions in its path, we encourage all firms, even those outside Harvey’s path of flooding and damaging winds, to consider their BCM readiness for such an event. Business Continuity Plans are designed to ensure firms have conducted sufficient advance preparation so … Continued

Surprise, Surprise: SEC Conducting Unannounced Exams

The Boston Regional Office of the SEC has recently conducted roughly 20 unannounced visits to registered investment advisers in the region. This fact, confirmed during the recent meeting of the New England Broker-Dealer and Investment Adviser Association (NEBDIAA), is in keeping with the SEC’s renewed focus on a more robust examination program. While onsite, the … Continued

One Phish, Two Phish, Red Phish, Blue Phish: How to Detect and Mitigate Social Engineering and Ransomware Techniques

Ransomware attacks like WannaCry and NotPetya are increasing in both frequency and damage, routinely making headline news with their abilities to bring down networks of established companies. Yet these cyberattacks typically start by compromising the weakest point in your security chain – people – through simple or complex phishing techniques before spreading to other parts … Continued

DOL Fiduciary Rule Transition Period Extension to 2019 Requested

The Secretary of Labor, Alexander Acosta, made a court filing on August 9 requesting the Transition Period and Delay of Applicability for the Department of Labor Fiduciary Rule be extended from January 1, 2018 to July 1, 2019. This court filing included extending the deadlines for the following Prohibited Contract Exemptions: Best Interest Contract Exemption … Continued

Mailing List

Subscribe to the Ascendant Compliance email list for the latest compliance resources, conferences, ComplianceCasts™, and more.

Loading form...

Contact Us

Ascendant works together with clients to identify and assess critical needs through customized plans. If you need assistance with compliance functions, regulatory services, cybersecurity or technology tools, we’d love to speak with you.