Strengthen their trade surveillance programs. In response to findings in the FINRA report, member firms should review their customer and proprietary data used to detect manipulative trading practices and ensure they have adequate coverage in their “reasonably designed” programs. This means that applicable rules and scenarios should be reviewed to ensure that potentially manipulative schemes such as layering, front-running, trading ahead, spoofing, wash sales, prearranged trading and momentum ignition are properly calibrated, and inclusive of potential schemes that involve correlated securities transactions such as stocks, exchange-traded funds (ETFs) and bonds.3
Trade surveillance programs likely may not be considered “reasonably designed” under FINRA requirements if specific measures to address potential momentum ignition trading. More specifically, member firms must be able to detect layering and spoofing activities where a customer places a non-bona fide bid (below the bid or above the offer) on one side of the market to entice other market participants to respond with a trade on the other side of the market. Additionally, firms must have the capacity to identify transactions in cross-product securities that manipulate the price of the underlying security, which influences the price at which a market participant can set or close a related options position.
Member firms should also evaluate whether their trade surveillance programs can effectively monitor trading activity across trading platforms which could involve related financial instruments or correlated securities products, as discussed above. Member firms should also review its trade surveillance scenarios specific to wash trading to ensure that they are monitoring instances where customers engage in wash trading to collect liquidity rebates from exchanges. This can be done by monitoring accounts flagged as “related” in a member firm’s wash trading/pre-arranged trading surveillance reports, and reviewing trading activity that relates to any information provided by a customer on onboarding/account opening documentation.
Member firms should also be aware of FINRA expectations regarding exchange-traded products (ETPs) and the unique surveillance challenges they may present. FINRA expects a robust supervisory program designed to protect material, non-public information (MNPI) to prevent front-running and trading ahead based upon ETPs. Such supervisory measures could include: information barriers to prevent leaking MNPI; reviewing the creation and redemption processes used in a member firms ETP program and tailoring the surveillance program to look for manipulative strategies that exploit those processes; reviewing strategies that seek to exploit information seepage from portfolio compression.
Finally, member firms should ensure their formal training programs are uniquely tailored to those with trade surveillance and reporting responsibilities including, but not limited to, potentially manipulative scenarios and escalation criteria. In planning, developing, and implementing a training program, each broker-dealer must consider its size, structure, scope of business and regulatory concerns, as front office personnel can be as effective in detecting potentially manipulative trading activities as compliance and operational team.4
Member firms should be prepared to adapt to evolving threats to their compliance programs, not just from manipulative trading, but from other areas of potential abuse.
FINRA appears poised to increase its focus on both trade surveillance and financial crimes more generally; therefore, member firms should proactively review their systems of internal controls to ensure they are “reasonably designed” to respond to increased threats from money laundering, cybersecurity, fraud and manipulative trading.
In response, firms will increasingly have to take holistic approach to compliance, as red flags for potential violative conduct may be better detected in other business units’ compliance processes – for example trade surveillance may be in a better positive to escalate manipulative conduct in micro-cap securities to the BSA/AML compliance teams; and coordination and data sharing in these investigations will be paramount.
Firms with a traditionally siloed approach to suspicious activity monitoring across trading, fraud, money laundering, sanctions and cybersecurity should migrate to a more integrated approach to avoid missing the potential correlation and interconnections between varying criminal threats. Examples of this evolutionary process might include: implementing a surveillance & monitoring Target Operating Model; creating an integrated center of excellence across the various surveillance functions; combining separate workflows to create a single case management workflow; and where possible, designing and implementing integrated controls.