Professional Documents
Culture Documents
Corruption and Fraud in Financial Markets
Corruption and Fraud in Financial Markets
in Financial Markets
Malpractice, Misconduct
and Manipulation
Carol Alexander
Douglas Cumming
WILEY
Registered office
John Wi ley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
For details of our global editorial offices, for customer services and for information about how to apply
for permission to reuse the copyright material in this book please see our website at www.wiley.com.
Ali rights reserved. No part of this publ ication may be reproduced, stored in a retrieva l system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise,
except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of
the publ isher.
W iley publishes in a variety of print and electronic formats and by print-on-demand. Some material
included with standard print versions of this book may not be included in e-books or in print-on-demand.
lf this book refers to media such as a CD or DVD that is not included in the version you purchased, you
may download this material at http://booksupport.wiley.com. For more information about W iley products,
visit www.wiley.com.
Designations used by companies to distinguish their products are often claimed as trademarks. AII brand
names and product names used in this book are trade names, service marks, trademarks or registered
trademarks of their respective owners. The publisher is not associated with any product or vendor
mentioned in this book.
Limit of Liability/Disclaimer ofWarranty: Wh ile the publisher and author have used their best efforts
in preparing this book, they make no representations or warranties with respect to the accuracy
or completeness of the contents of this book and specifically disclaim any implied warranties of
merchantabi lity or fitness for a particular purpose. lt is sold on the understanding that the publisher is not
engaged in rendering professional services and neither the publisher nor the author shall be liable for
damages arising herefrom. lf professional advice or other expert assistance is required, the services of a
competent professional should be sought.
10 9 8 7 6 S 4 3 2 1
Chapter 18: Benford's Law and lts Appl ication to Detecting Financial
Fraud and Manipulation 473
Christina Bannier, Corinna Ewelt-Knauer, Johannes Lips, and Peter Winker
18.1 lntroduction 47 4
18.2 Benford's Law and Generalizations 476
18.2.1 The Basic Principie of Benford's Law 476
18.2.2 lllustration of Benford's Law 477
18.2.3 Testing for Conformity with Benford's Law 478
18.2.4 Considering Further Digits with Benford's Law 480
18...2..5_Wben.Jla Data Caofarm ta B.~eo~f~n~cd~'sI,
~a~w
~?~ - - - - - - - - - -~48~2
18.2 .6 Limitations of Using Benford's Law for ldentification of Manipulations 483
18.2.7 General izations of Benford's Law for ldentification of Manipulations 484
18.3 Usage of Benford's Law for Detecting Fraud and Deviant Behaviour 485
18.3.1 Forensic Accounting in the Context of Auditing, Internai Contrai
Systems, and Taxation 486
18.3 .2 Finance 487
18.3.3 Surveys and Research 490
18.4 A Case Study: Benford's Law and the LI BOR 491
18.5 Policy lmplications 498
18.6 Summary, Limitations, and Outlook 498
References 499
18.A Appendix 504
Chapter 21; Judi cial Local Protectionism anel Home Court Bias
in Corporate Litigation 541
Michael Firth, Oliver M. Rui, and Wenfeng Wu
21.1 lntroduction 542
21 . ~ itutional Baclsg_li.l~nç!_ 5M:
21.2.1 Decentra iization and Local Protectiooism 5M:
21 .2.2 Judicial lndependence 5A5.
21.2.3 The Heterogeneity of the Legal Environment across Regions 548
21 .3 Empirical Evidence 548
21 .3.1 Sample 549
21.3.2 Basic Statistics 550
21.3.3 The Wealth Effect for Defendants and Plaintiffs around the
Filing Announcements at Different Courts 556
21 .3.4 The lmpact of Court Location on the Wealth Effect 560
21.3.5 Regression Analysis of the Wealth Effects from a Filing Announcement 560
21.3.6 Heckman Two-Step Analysis of Sample Selection Bi as 567
21.3.7 The lmpact of Court Location on the Likelihood to Appeal 573
2'1.3.8 Sensitivity Tests .52fi
21 4 Canclusiao 5.29.
References 580
Jruiex 5.83.
Ale.xander42 l 771_ftoc.indd 13
An Overview of Market Manipulation 19
should not be prohibited as manipulative; but fictitious trades (e.g. trades in which the
buyer and seller is the sarne person) and spreading false information shou ld be clas-
sified as fraud. Their reasoning is that (i) purely trade based manipulation is unlikely
to be successfu l; and (ii) rules that prohibit manipulation deter some legitimate trad-
ing. Dozens of subsequent prosecution cases that show purely trade-based market
manipulation is not justa theoretica l possibility, but can be highly profitable, casts
doubt over their reasoning.
Thel (1994) delivers a strong rebuttal. Based on evidence in the economics lit-
erature Thel argues that manipulation is easier to accomplish than Fischel and Ross
claim and provides some striking examples. Thel points out that manipulators can
sometimes contrai prices with trades and in doing so profit either from pre-existing
contracts that are contingent on prices, or by inducing other market participants to
trade at manipulated prices.
Thel uses the term "manipulation" to mean trading undertaken with the intent of
increasing or decreasing the reported price of a security. Cherian and Jarrow (1995)
define manipulation as trading by an individual (or group of individuais) in a man-
ner such that the share price is influenced to his advantage. Many subsequent papers
implicitly use the term "market manipulation " to refer to trading strategies or actions
taken to influence the price to one's advantage.
ln forming their view about what forms of trading should or should not be pro-
hibited, Kyle and Viswanathan (2008) consider the welfare effects of trading. They
propose that trading strategies should on ly be illegal if they undermine economic effi-
ciency both by decreasing price accuracy and reducing liquidity. Unless both of these
conditions are satisfied, the trading strategy is not unambiguously social ly harmful
and therefore, according to Kyle and Viswanathan, should not be prohibited.
'Wash trades'
'Pools'
Action-based Action-based
'Layering'
'Comer'
Market power
techniques
- - - Trade-based
--[ 'Squeeze'
ln the first category of market manipulation, "runs", the manipulator takes either
a long ora short position in a stock, inflates or deflates the stock's price while attract-
ing other traders, and fina lly reverses his position at the inflated or deflated price.
While runs are commonly observed in the stock market, in principie they could be
conducted in any financial security. Runs that involve the manipulator taking a long
position and then inflating a stock's price are often referred to as "pump-and-dump"
manipulation, whereas the reverse strategy of first taking a short position and then
manipulating the price downwards is known as a "bear raid" . The stock "pumping"
or "raiding" can take anywhere from a matter of seconds to severa! years and involve
techniques such as spreading rumours, executing wash trades, and coordinated pool-
ing by severa! manipulators.
A feature of runs is that the manipulator profits directly from the manipulated mar-
ket by exploiting other investors that buy at inflated prices or sell at depressed prices.
The main challenge in conducting this form of manipulation is having to induce other
market participants to buy or sell the manipulated security.
The second category of market manipulation, "contract-based manipulation" or
"benchmark manipulation" or "reference rate manipulation" contrasts with a run in
that it involves the manipulator profiting from a contract or market that is externai to
the manipulated market. For example, a manipulator might take a position in a deriva-
tives contract and then manipulate the underl ying stock price to profit from the deriv-
atives position. Ora manipulator might have positions in securities whose cash flows
or prices are determined by a financial benchmark (e.g. floating rate loans, swaps,
futures) and then manipulate the benchmark to profit from the externai positions.
An important difference between runs and contract-based or reference rate
manipulation is that the latter does not require the manipulator to induce others to
trade at manipulated prices. This category of manipulation therefore tends to be more
mechanical.
The third category of manipulation is "spoofing" and other order-based tech-
niques. General ly speaking, spoofing involves submitting orders to a market with
the intention to cancel the orders before they execute. The defining feature of this
category is that orders play a central role in the manipulation, although they are often
accompanied by trades as part of the strategy. Although spoofing can be performed
manual ly, this type of market manipulation naturally lends itself to being imple-
mented by a computer algorithm that manages the entry, amendment, and cancel-
lation of the manipulative orders. Automating the strategy allows it to be scaled and
repeated many times. While each instance of spoofing might make only a small profit,
repetition can be used to accumulate a sizable profit. This category of manipulation
is often implemented at relatively high frequencies, with positions typically opened
and closed intraday.
Dueto the growth in algorithmic and high-frequency trading, spoofing and order-
based market manipulation techniques have gained increasing attention in recent
years. Regulators have brought a number of prosecution cases against such manip-
ulation, lawmakers have made legislative amendments to account for this form of
manipulation, and market/surveillance system operators have developed algorithms
to detect such strategies.
The fourth broad category of manipulation techniques involves the manipulator
exploiting market power by, for example, taking a controlling position in the supply
of a security. Like contract-based manipulation, market power techniques are more
mechanical in nature than runs. However, they are similar to runs in that the manipu-
lator profits by exploiting participants of the manipulated market.
Within the four broad categories, manipul ation techniques can be further grouped
according to the five main mechanisms used in their implementation. Allen and
Gale (1992) define three of the five techniques: trade-based, information-based, and
action-based techniques, which I augment by adding order-based and submission-
based techniques. Trade-based manipulation involves influencing the price of a finan-
cial instrument through trading. ln information-based manipulation, a manipulator
(xiv) Layering
Is a form of spoofing that involves placing one or severa! orders on one side of a
visible limit arder book (the bidor the offer side) atone or severa! price steps to cre-
ate a false or misleading impression with respect to the real demand or supply in a
given security. Being a form of spoofing, the manipulator's intention is for the orders
not to execute and therefore most spoofing orders result in cancellations. The term
14
For example, at the time of the recent manipu lations, USO LIBOR was based on submissions from
around 20 banks, taking an average that excludes the highest one-quarter and lowest one-quarter of the
submissions.
"layering" stems from the fact that often the manipulator's orders are placed in lay-
ers across several price steps or on top of one another ata given price step. Layering
could also be done with a single large orderr. Collectively, the layering orders often
represent a substantial proportion of the orders on one side of the limit arder book.
They are often placed close to the best quotes at the time, and sometimes dynami-
cally amended (or cancelled) as the market moves closer to the layering orders to
avoid execution. Layering can be used to help obtain a more favourable execution
price for a trade that the market participant wants to execute for an unrelated reason.
For example, a trader wanting to sel l out of a long position could use layering buy
orders to temporarily inflate the market price by misleading other market participants
and then sell the actual position at an inflated price. However, layering can be, and
often is, used repeatedly in a cycle together with other orders that profit from distorted
prices. A typical layering cycle is as follows: (i) place a small sell order ator near the
best ask price, (ii) layer the bid side of the order book until the market moves up and
the smal l sei! arder executes, (i ii) cancel the layering bid orders and repeat the above
steps in the opposite direction.
it is less clear exactly how this manipulation technique is used in conjunction with
other strategies to make a profit. Quote stuffing has nevertheless been acknowledged
as a form of market manipulation in severa! jurisdictions, in particu lar if the orders are
submitted with the intention of being cancelled before execution. 15
15
For example, the lnvestment lndustry Regu latory Organization of Canada (IIROC) Rules Notice Guid-
ance Note 13-0053 confirms IIROC's position that quote stuffing is "considered a manipulative and decep-
tive trading practice". Similarly, the US Commodity Futures Trading Commission (CFTC) lnterpretative
Guidance and Policy Statement (RIN 3088-AD96) concerning the anti-spoofing provisions introduced into
US legislation with the Dodd-Frank Act provides quote stuffing as one of the examples of trading that is
considered spoofing and therefore prohibited.
16
See IIROC Ru les Notice Guidance Note 13-0053 and ESMA Final Repor! 2015/224.
starts with an overview of the theoretical literature, followed by the empirical litera-
ture. lt then summarizes what we know and don't know about market manipulation
based on the literature and points out some future research directions.