6 Types of Market Abuse | SIX (2024)

Table of Contents

  • Since When Has Market Abuse Existed?
  • What Is Market Abuse?
  • 6 Types of Market Abuse

It was 1:00 am on February 21, 1814, when the door of the Ship Inn in Dover was suddenly yanked open and a Bourbon officer, seemingly near exhaustion, rushed in. He had just crossed the Channel from France, he gasped, and had come bearing the greatest news in the last 20 years. Then he asked for paper and ink and penned a letter to the admiralty in London conveying “dispatches of the happiest nature,” namely that “Bonaparte was overtaken by a party of Cossacks, who immediately slayed him.”

News of Napoleon’s demise circulated. People heaved a sigh of relief and the markets reacted euphorically. But when the hoax came to light –Napoleon would die seven years later – it turned out that the purported officer and his sidekicks had purchased British government bonds beforehand, earning a profit of 500,000 British pounds (GBP 50 million in today’s currency) on subsequently selling them. The conspirators were prosecuted, and their crime established a legal precedent and went down in the annals of history as the Great Stock Exchange Fraud of 1814.

Since When Has Market Abuse Existed?

The alleged death of Napoleon is a prominent example of market abuse, but it’s neither the first nor the last one. Back in 600 BC, the philosopher Thales of Miletus cornered the market for olive presses, gaining a monopoly over it. And in 2022, the US Securities and Exchange Commission (SEC) filed 43 criminal complaints in court for the offense of insider trading alone (15 more than in 2021).

What Is Market Abuse?

The SEC applies a very broad definition to do justice to the countless ways that exist to unfairly manipulate the market. “Market manipulation,” the SEC writes, “is when someone artificially affects the supply or demand for a security (for example, causing stock prices to rise or to fall dramatically).”

6 Types of Market Abuse

Despite this very generalized wording and although fraudsters are very inventive, an exhaustive “taxonomy of cheating” of sorts actually exists today. The Financial Markets Standards Board (FMSB), a nonprofit organization that develops new market standards, examined 400 cases of market abuse in 28 countries spanning over 200 years in a large-scale study and grouped almost two dozen different market manipulation techniques into six misconduct categories.

“History may not repeat itself, but it rhymes” is the motto of the study. Decide for yourself in which category you would classify the Great Stock Exchange Fraud of 1814.

1. Price Manipulation

The spectrum of behaviors that illicitly influence the price of securities or derivatives includes the following:

Spoofing

The term “spoofing” stems from the IT sector and means “deception,” “manipulation,” or even “disguisem*nt,” and it refers to an attempt to conceal one’s identity. On the markets, spoofing means deceiving under false pretenses: the defrauding party feigns interest by placing a large purchase or sell order and afterwards immediately cancels the order.

Layering

In this specific form of spoofing, the defrauding party enters multiple orders in different places in an attempt to create the illusion of market liquidity.

Ramping

Building (or ramping) a position in a security through the purchase of multiple small lots causes prices to constantly increase. This artificially inflates the market, and the defrauding party afterwards can sell a large lot of the security at an excessive price.

Pools

Dealing rings that collude to engage in prearranged transactions do that with the objective of driving up prices by creating a false impression of market activity. Manipulations by these pools usually take place over extended periods and can stretch over months.

Cornering the Market

“Cornering the market” is an attempt to achieve a dominant controlling position in order to influence the price of a commodity, a security, and/or a related derivative.

Squeeze

If a party does not seek a dominant controlling position in the market but only strives for a position large enough to influence prices, this is called a squeeze.

Bull/Bear Raid

Disseminating false or misleading information about a security or its issuer can impact the price of the security. This type of manipulation is called a bull or bear raid depending on whether the aim is to cause the price to rise or fall.

Pump-and-Dump

Pump-and-dump is a prominent form of bull raid in which a security first gets hyped (“pumped”) and then when its price climbs high enough, the perpetrator sells (“dumps”) his position.

2. Circular Trading

Circular trading typically involves entering into transactions that cancel each other out and therefore do not transfer any market risk or value. The spectrum of transactions with no legitimate commercial rationale includes:

Wash Trades

The simultaneous purchase and sale of the same financial instrument for the same volume and price between two counterparties is called a wash trade. Neither party derives a benefit or affects its risk structure through the transaction.

Churning

Churning is executing wash trades solely for the purpose of generating commissions.

Compensation Trades

In this variant of wash trades, a securities transaction is used as a medium to disguise a payment. The primary objective of a compensation trade is not to manipulate a market, though market manipulation is often a collateral effect.

Parking

Securities can be sold to a buyer subject to an agreement that they will be repurchased by the seller shortly afterwards at a pre-agreed price. If the objective of this arrangement is to conceal the identity of the true owner of the securities, this is called parking.

3. Misuse of Insider Knowledge

Insider knowledge becomes a detriment to third parties in cases of:

Insider Trading

Insider trading is when a buyer or seller obtains an unfair advantage from the use of inside information.

Unlawful Disclosure of Inside Information

It is illegal to disseminate inside information.

4. Price influencing

Actions or attempts undertaken to influence reference prices that are used in the market to value other positions are illegal. The various ways of illicitly influencing reference prices include:

Manipulation of Submission-Based Fixes

This has to do with transmitting false or inaccurate information used to calculate a closing price, reference price, or index.

Manipulation of Transaction-Based Fixes

This has to do with buying or selling a large volume of securities and/or derivative contracts with the intent of illicitly influencing a benchmark.

Portfolio Price Manipulation

The objective of this type of price manipulation is to enhance the performance of a portfolio shortly before a reporting period deadline. It is also called window dressing.

Triggering or Protecting Barriers

This technique involves deliberately engaging in actions to trigger or to avert the triggering of barriers that act as reference levels for associated derivative contracts.

5. Improper Order Handling

Customers or their data can be misused by:

Disclosing Client Order Information

Dissemination of client order information gives third parties an information advantage over the market at large.

Front-Running

The defrauding party enters into a transaction in advance of (i.e. front-runs) a known pending order with the intention of profiting from the anticipated impact of the pending order on the market.

Cherry Picking

If the allocation of a security to a client is withheld pending assessment as to whether the execution order is a winning or losing trade, this is called cherry picking. If the market moves adversely, the trade is allocated to the client. If the market moves positively, the trade is taken by the defrauding party.

Triggering or Protecting Stop-Loss Orders

By deliberately triggering or protecting stop-loss or other limit orders, the defrauding party gains an advantage, usually to the detriment of clients and other market participants.

6. Misleading Conduct

A misleading impression can be created in the minds of clients or market participants by:

Disseminating Inaccurate or False Information

False information can concern bids, offers, or transactions that have never taken place or for which no actual orders exist.

Since regulatory authorities are always on the close lookout for market manipulations and don’t hesitate to punish infractions, it is imperative for financial institutions to monitor for market abuse and manipulation attempts and ideally to prevent them from happening.

SICAM 2.0 from SIX: Easy Monitoring and Reporting of Market Abuses

SICAM 2.0 from SIX is an integrated service against market abuses. The tool facilitates compliance with regulatory requirements related to the fulfillment of the Suspicious Transaction Reporting (STR) obligation pursuant to the Market Abuse Regulation (MAR). Additionally, it provides a function to support internal code of conduct management. Its standard alerts cover a wide range of infractions including spoofing, wash trades, insider trading, and front-running.

Find Out More about SICAM 2.0

Explore Related Articles

  • #securities
  • #data management
  • #trading

Discover More

  • Tick-Tick-Tick: How Ticker Symbols Shape the Financial System 30 Apr 2024 4 minutes Ticker symbols are inconspicuous but crucial combinations of letters and digits that uniquely identify publicly traded companies and their products. Read below why the putatively simple codes are important for trading and investors and how they originate in the first place.
  • Where to Go Public: Switzerland or the U.S.? These 5 Aspects Are Crucial 04 Apr 2024 5 minutes Swiss companies that want to go public occasionally face the question of whether to do that in Switzerland or in the U.S. Read below what key factors play a role in deciding and why an exchange listing in Switzerland is often the more sensible route.
  • CO2 Offset: How It Works, What It Delivers – and What Has to Change 30 Nov 2023 6 minutes Many companies buy CO2 certificates to offset their CO2 emissions. How exactly does that work? And how big a benefit does it deliver?
6 Types of Market Abuse | SIX (2024)

FAQs

6 Types of Market Abuse | SIX? ›

There are two main categories of market abuse: insider dealing and unlawful disclosure. These are divided into 7 sub-categories. Behaviour 1: Insider dealing is using inside information unlawfully. Compliance is easily handled through the proper use of insider lists.

What are the 6 types of market misconduct? ›

“Market misconduct” as regulated under Parts XIII and XIV comprises 6 offences:
  • insider dealing.
  • false trading.
  • price rigging.
  • disclosure of information about prohibited transactions.
  • disclosure of false or misleading information inducing transactions.
  • stock market manipulation.

What are the forms of market abuse? ›

There are two main categories of market abuse: insider dealing and unlawful disclosure. These are divided into 7 sub-categories. Behaviour 1: Insider dealing is using inside information unlawfully. Compliance is easily handled through the proper use of insider lists.

What are the main elements of market abuse? ›

Market abuse as a civil offence
  • Market Manipulation. A person may be accused of market manipulation if they attempt to give or appear to give false or misleading signals about a financial instrument's supply, demand, or price. ...
  • Unlawful disclosure of inside information. ...
  • Insider dealing.
Feb 7, 2024

What does market abuse include? ›

This is where a person buys or sells securities on the basis of material information that is not yet publicly known and which could affect the price of the securities if it were made public. For example, a takeover that has not yet been declared to the market.

What are the six types of defensive marketing strategies? ›

the means used by companies in market leadership positions to defend their market share from attacks by challengers; six common defence strategies are position defence, flanking defence, pre-emptive defence, counter-offensive defence, mobile defence and contraction defence.

What are market abuse Offences? ›

The first of these – market manipulation – is a relatively broadly drawn offence that captures the following four activities: 'manipulating transactions'; 'manipulating devices'; 'dissemination, misleading behaviour and distortion'; and 'misleading information or inputs in relation to benchmark'.

What are the red flags of market abuse? ›

Red flags to watch for: executing firms and brokers must remain cognitive of market abuse red flags which can include; clients generating frequent STORs, clients with suspicious trading patterns around M&A speculation and/or official announcement, increased trading activity on a specific security etc.

What are the principles of market abuse? ›

It focuses on financial markets' integrity - notably insider dealing, disclosure of inside information and market manipulation (including specific provisions on pre-sounding of investors and stabilisation of securities). It also provides for preventive measures such as prompt disclosure of inside information.

What is the best description of market abuse? ›

The definitions for market manipulation are laid out in Article 12 of MAR. It refers to the act of misleading the market through certain activity or to activities that manipulate the price.

How do you detect market abuse? ›

How to detect Wash Trading and other Market Abuse Behaviors. To detect Wash Trading, firms should look out for unusual or atypical trading patterns among their traders – buying and selling in a brief time period that has no impact on the position or PNL of the entity.

What are the techniques of market abuse? ›

Market manipulation refers to artificial inflation or deflation of the price of a security. Market manipulation can be difficult not only for authorities but also for the manipulator. There are two major techniques of market manipulation: pump and dump, and poop and scoop.

Who does market abuse apply to? ›

Who is impacted by MAR? MAR affects all market participants trading the following financial instruments: Any financial instruments admitted to trading on a regulated market or where a request for admission to trading on a regulated market has been made.

What is the market misconduct? ›

'Market misconduct' includes 6 offences: insider dealing, false trading, price rigging, disclosure of information about prohibited transactions, disclosure of false or misleading information inducing transactions and stock market manipulation.

What are the 6is in marketing? ›

Explore the characteristics of the media of e-marketing using the 6 'I's of Interactivity, Intelligence, Individualisation, Integration, Industry structure and Independence of location.

What is financial market misconduct? ›

It includes buying securities ahead of the disclosure of good news, and selling securities ahead of the release of bad news. A related offense is “tipping”, which occurs when a person tells another person of the undisclosed material information, without a legitimate business reason for doing so.

What is an example of market conduct? ›

Examples of market conduct include price setting behavior and buying and selling practices. For example, in an environment where there are many buyers and sellers, the market tends to determine the price. If one trader tries to increase his or her price, he or she sells nothing.

Top Articles
The Benefits of Posting the Staff Schedule 2-3 Weeks in Advance
Mineral Resources for the Future Economy
Knoxville Tennessee White Pages
Cold Air Intake - High-flow, Roto-mold Tube - TOYOTA TACOMA V6-4.0
Wizard Build Season 28
Readyset Ochsner.org
Apex Rank Leaderboard
Elden Ring Dex/Int Build
Atrium Shift Select
Skip The Games Norfolk Virginia
Oppenheimer & Co. Inc. Buys Shares of 798,472 AST SpaceMobile, Inc. (NASDAQ:ASTS)
Elizabethtown Mesothelioma Legal Question
Missing 2023 Showtimes Near Landmark Cinemas Peoria
Sony E 18-200mm F3.5-6.3 OSS LE Review
Gino Jennings Live Stream Today
Munich residents spend the most online for food
Tamilrockers Movies 2023 Download
Katherine Croan Ewald
Diamond Piers Menards
The Ultimate Style Guide To Casual Dress Code For Women
Site : Storagealamogordo.com Easy Call
Is Windbound Multiplayer
Filthy Rich Boys (Rich Boys Of Burberry Prep #1) - C.M. Stunich [PDF] | Online Book Share
Integer Division Matlab
Sandals Travel Agent Login
Horn Rank
Ltg Speech Copy Paste
Cognitive Science Cornell
Random Bibleizer
Craigslist Fort Smith Ar Personals
The Clapping Song Lyrics by Belle Stars
Poe T4 Aisling
R/Sandiego
Kempsville Recreation Center Pool Schedule
Rogold Extension
Beaver Saddle Ark
Log in or sign up to view
A Man Called Otto Showtimes Near Amc Muncie 12
Powerspec G512
Saybyebugs At Walmart
2007 Jaguar XK Low Miles for sale - Palm Desert, CA - craigslist
Miami Vice turns 40: A look back at the iconic series
Love Words Starting with P (With Definition)
Tlc Africa Deaths 2021
Youravon Com Mi Cuenta
Nope 123Movies Full
Kushfly Promo Code
Diario Las Americas Rentas Hialeah
Game Akin To Bingo Nyt
Marion City Wide Garage Sale 2023
Latest Posts
Article information

Author: Cheryll Lueilwitz

Last Updated:

Views: 6072

Rating: 4.3 / 5 (54 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Cheryll Lueilwitz

Birthday: 1997-12-23

Address: 4653 O'Kon Hill, Lake Juanstad, AR 65469

Phone: +494124489301

Job: Marketing Representative

Hobby: Reading, Ice skating, Foraging, BASE jumping, Hiking, Skateboarding, Kayaking

Introduction: My name is Cheryll Lueilwitz, I am a sparkling, clean, super, lucky, joyous, outstanding, lucky person who loves writing and wants to share my knowledge and understanding with you.