Spoofing: What it is and our top 5 tips for prevention - HFW (2024)

We take a deep dive into the practice of spoofing, what it looks like, and how we can prevent it from happening.

What is spoofing?

Spoofing is a type of disruptive trading behaviour that can occur frequently in the commodities markets, or where there is the use of algorithmic or high frequency trading strategies.

Spoofing (also referred to as ‘layering’) is a term used to describe a form of market manipulation where traders place a bid or offer with no intention of fulfilling it, instead cancelling the bid or offer before execution. The actual form of spoofing can vary, however it usually involves the placing of non-bona fide orders on one side of the order book which are then cancelled immediately or soon after. The purpose of the spoof is usually to artificially move the price of the relevant security or commodity, by creating a false impression of its supply or demand in the market, in order to benefit the trader’s own trading position.

The Financial Conduct Authority (FCA) in the UK is the main body responsible for enforcement action in relation to spoofing and market manipulation. It highlighted its concerns about such behaviour as early as August 2009 in their Market Watch newsletter (Issue 33) and have continued in subsequent newsletters to emphasise the importance of firms taking measures to prevent and detect such behaviour. The FCA’s commitment to taking action on market abuse was most recently confirmed in their 2022-2025 strategy in which they committed to making significant upgrades in their market surveillance systems to enable them to “keep pace with evolving market abuse techniques and take advantage of advancements in big data analytics” to catch out potentially abusive market behaviours.

What are the consequences for those who engage in spoofing practices?

The UK Market Abuse Regulations (UK MAR), which is based on and still closely follows the EU Market Abuse Regulations, contains a general prohibition against ‘market manipulation’ and provides the definition of market manipulation in Article 12 which includes examples of the broad type of behaviours which would fall under this category, such as entering into a transaction which gives false or misleading signals as to the supply/demand/price of a financial instrument. Annex 1 provides further examples of types of behaviours which could amount to market manipulation, although these types of behaviour may be difficult to spot. Under UK MAR the FCA can take regulatory (civil) action against firms and individuals found to have engaged in market abuse. Regulatory action can include a financial penalty, being prohibited from certain activities1 and withdrawal of approval.

In a criminal context, market manipulation is covered by the Financial Services Act 2012 (FSA 2012) and the Fraud Act 2006 (FA 2006). Section 89 of the FSA 2012 contains the offence of making misleading statements where it must be shown that the person making the statement knew it was it to be false and misleading or was reckless or dishonest in doing so.

Section 90 of the FSA 2012 is the offence of making misleading impressions, where the person intended to make a misleading impression with the intention of inducing another to acquire, dispose of or subscribe to investments, while making a gain for himself or causing loss to another. Although, note for this offence, no actual gain or loss needs to have been taken place for the offence to be made out.

For the FSA 2012 offences, it will be a defence if it can be shown that there was a ‘reasonable belief’ that the conduct in question would not create a false or misleading impression.

There is a separate offence under Section 2 of the Fraud Act 2006 of dishonestly making a false representation intending to make a gain for himself or cause loss to another.

All of the above criminal offences carry a maximum punishment of 10 years’ imprisonment and/or an unlimited fine.

How to prevent it

Firms and individuals who arrange or execute transactions are required under Article 16 of UK MAR to establish and maintain effective arrangements, systems and procedures to detect and report market abuse while market operators and investment firms who operate trading venues are required to have similar controls in place to prevent and detect market abuse.

Prevention and detection include conducting regular risk assessments focused on market abuse risks, conducting real time (or as near to as possible) transaction monitoring/surveillance and ensuring that those responsible for managing financial crime risks (e.g. front office employees as well as those in the compliance function) are given training to understand what market abuse is and to identify suspicious transactions and orders. Some examples of key data points to look for when analysing trading data are any size discrepancy between buy and sell orders on both sides of the market, the percentage of cancelled orders relative to the number of orders placed, the passage of time before large volume orders were cancelled, and the frequency of order patterns.

In its May 2022 Market Watch Issue 692 newsletter the FCA focused on market conduct and transactions reporting issues and suggested that companies can go further in their efforts to prevent spoofing and improve on the efficacy of their risk assessments by gathering additional data on the different business areas, the methods of execution for trades, the different asset classes and specific financial instruments. In relation to order and trade surveillance arrangements, it indicated that it favoured a tailored approach to surveillance which took into account the different characteristics of different asset classes and instruments, which in turn would reduce the number of false positives.

Reporting suspicions

Where a firm identifies any orders, transactions, or behaviour which they have ‘reasonable grounds’ to suspect might be market abuse, they must make a suspicious transaction and order report (STORs)3 to the FCA who then have the option to initiate an investigation.

In terms of timing the FCA take the view that STORs should be submitted without delay, once a reasonable suspicion that the relevant conduct could constitute market abuse is formed. It does, however, recognise that where firms identify conduct by their own employees they may wish to conduct an internal investigation to establish what has happened and state that in such circ*mstances any further information not available at the time the STOR is made can be sent to them at a later date.

For individuals faced with enquiries from the FCA in relation to spoofing or other market abusive behaviours, it will be a defence to show that they had ‘reasonable belief’ that the conduct in question would not create an impression which was false or misleading. It is also worth noting that there are scenarios in which the cancellation of orders is perfectly legitimate; each case will depend on the facts and an analysis of the trading patterns as a whole.

How to respond to a query by the FCA

When the FCA becomes aware of a transaction which could be a form of market manipulation, whether from its own transaction monitoring or as a result of a STOR, the first step will always be engagement with the employer organisation. The FCA has the power to issue information requests, and it is highly advisable to comply with such requests.

The regulator may want further information, and as a company it will be important to preserve any transaction data, any risk assessments that were conducted, and any policies and procedures related to market manipulation that the company has in place. It is recommended that legal advice is taken at the earliest opportunity to ascertain whether an internal investigation or disciplinary proceedings are necessary. Experienced investigations lawyers will also be able to provide tactical insight as to how best to deal with regulators, assisting as needed but also minimising the business risk for the company generally.

If you are an individual who approached by the FCA, the key takeaway is to be able to show that the transactions were done with a reasonable belief that the conduct in question would not amount to creating a false or misleading impression. Examples of this can be to show that the individual was in fact compliant with any existing policies on market manipulation or show that the cancellation of orders for example were for a bona fide reason, or that they had reasonable belief to that they were not creating a misleading impression.

Like a company, the individual should also collect and preserve all records and/or transaction data in relation to the trades to aid their defence.

Conclusion

In its 2020-2025 strategy the FCA committed to taking decisive action where market abuse is detected using “the full range of our supervisory and enforcement tools, including criminal and civil sanctions where appropriate, to pursue offenders and deter future wrongdoers”.

Whether the FCA will pursue civil enforcement in the case of spoofing will vary depending on the facts and an analysis of the trading patterns of each case, therefore preserving all relevant information and records is key. While the UK does not have a codified criminal offence of spoofing like the US does , the FCA continues to robustly investigate cases of market abuse.

Unlike the UK, the US has had a run of success in prosecuting individuals for spoofing, the most recent result in August 2022 when the DOJ successfully convicted Michael Nowak and Gregg Smith. Nowak and Smith were former precious metals traders at JP Morgan in Chicago, IL, and their conviction represents the largest successful prosecution of spoofing in the US thus far.

Top 5 Tips to reduce the risk of spoofing

We recommend:

  1. Risk assessments for market abuse should be comprehensive, accurate and up to date.
  2. Trade surveillance is undertaken and that it is calibrated to the underlying assets being traded. The price movements in some assets can be very different to others and if not properly calibrated it is likely false positives will result.
  3. Policies and procedures and training should be detailed and up to date. We recommend that policies should include guidance as to what the signs of suspicious activity might include and what information to use and/or consider.
  4. If your trade surveillance is outsourced, whether internally or externally, ensure that the firm understands what work is actually being done on its behalf and that it is effective for the UK business (for example, that it is appropriately calibrated)
  5. Provide regular and tailored training to staff to ensure that they understand market abuse and their role in escalating potentially suspicious behaviour.

Footnotes

  1. For example, Corrado Abbattista, a trader and portfolio manager, partner and chief investment officer at Fenician Capital Management LLP was fined £100,000 in December 2020 and prohibited from performing any function in relation to any regulated activities in connection with a number of misleading orders he placed in 2017.https://www.fca.org.uk/publication/final-notices/corrado-abbattista-dec-2020.pdf
  2. https://www.fca.org.uk/publications/newsletters/market-watch-69
  3. STORs relate to suspicions of market abuse and should not be confused with Suspicious Activity Reports (SARs) made to the NCA when money laundering is suspected.

Spoofing: What it is and our top 5 tips for prevention - HFW (1)

Download Briefing

Download a PDF version of ‘Spoofing: What it is and our top 5 tips for prevention’

Download

Spoofing: What it is and our top 5 tips for prevention - HFW (2024)

FAQs

What is spoofing and how it can be prevented? ›

The best way to prevent a spoofing attack, on the user education side of things, is to keep a lookout for signs that you are being spoofed. For example, a phishing attack that uses email spoofing may feature unusual grammar, poor spelling, or awkward language.

Which of the following are ways you can prevent being spoofed? ›

How to prevent spoofing
  • Avoid clicking on links or opening attachments from unfamiliar sources. ...
  • Don't answer emails or calls from unrecognized senders. ...
  • Where possible, set up two-factor authentication. ...
  • Use strong passwords. ...
  • Review your online privacy settings. ...
  • Don't give out personal information online.

What WTF is spoofing? ›

Spoofing is a type of scam in which a criminal disguises an email address, display name, phone number, text message, or website URL to convince a target that they are interacting with a known, trusted source.

What is spoofing in simple words? ›

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

Can I stop spoofing? ›

Install a spam call blocking or spoofing protection app

You can also use a third-party call blocking app to help block robocalls, text spam, scam calls, and more. Popular options include: Nomorobo blocks robocalls, and also screens possible scammers. Truecaller blocks spam calls and can reveal spoofed numbers.

What is spoofing and why is it illegal? ›

When is spoofing illegal? Under the Truth in Caller ID Act, FCC rules prohibit anyone from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm or wrongly obtain anything of value. Anyone who is illegally spoofing can face penalties of up to $10,000 for each violation.

What is the defense against spoofing? ›

Employ Packet Filtering with Deep Packet Inspection

Packet filtering analyzes IP packets and blocks those with conflicting source information. Because malicious packets will come from outside the network despite what their headers say, this is a good way to eliminate spoofed IP packets.

Can I block spoofed calls? ›

Filtering or blocking a number is different for iOS users and Android users, but both essentially involve pulling up your settings, and then selecting some sort of “block contact” option. Your carrier may also provide additional methods of stopping unwanted calls, such as Verizon Mobile's Call Filter app.

What is the most common type of spoofing? ›

Email spoofing is the most common of all the modalities found on the network today. This technique has similar traits to phishing as it is a technique through which the spoofer sends emails to many email addresses impersonating real identities, using official logos and headers.

How would you know if someone is spoofing you? ›

If you get calls from people saying your number is showing up on their caller ID, it's likely that your number has been spoofed. We suggest first that you do not answer any calls from unknown numbers, but if you do, explain that your telephone number is being spoofed and that you did not actually make any calls.

What happens if you get spoofed? ›

Phone number spoofing causes the Caller ID to display a phone number or other information to make it look like the calls are from a different person or business. While the caller's information may appear local, the calls are often placed by telemarketers located outside the state or country.

How serious is spoofing? ›

Risks and Implications of Spoofing

It sneaks into private data like a thief, taking things like passwords, money details, or even personal secrets about customers. Financial Loss: Spoofing scams can trick people into sending money where it shouldn't go.

What to do when spoofed? ›

Create a new voice message.

If you're getting a large number of calls from angry victims of phone scams, change your message bank voice message to explain that your phone number has been spoofed and that you're sorry and that anyone who has received a scammy call from you should block your number.

How does spoofing start? ›

Email spoofing happens when the sender uses a fake email address to conduct criminal activity. This can be anything from sending attachments that, when downloaded, install ransomware or other malware that spreads across an entire network, to convincing the end-user to send money or sensitive financial information.

Is spoofing risky? ›

IP address spoofing involves an attacker using a fake IP address to masquerade as a legitimate user or device. This can compromise network security and data integrity, leading to unauthorized access and data breaches.

How do you prevent spoofing exchange? ›

Log in to your Exchange or Microsoft 365 portal and go into the Admin> Exchange area. Click on the mail flow section and then click the + sign in the right-hand area and select Create a new rule… Give the rule a relevant name, such as Domain Spoof Prevention and then click on more options.

Can I stop my email from being spoofed? ›

How to prevent email spoofing attacks? To prevent email spoofing attacks, it's important to take advantage of available email authentication methods, including the Sender Policy Framework (SPF), Domain-based Message Authentication, Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM).

How can you prevent IP spoofing? ›

The options to protect against IP spoofing include:
  • Monitoring networks for atypical activity.
  • Deploying packet filtering to detect inconsistencies (such as outgoing packets with source IP addresses that don't match those on the organization's network).
  • Using robust verification methods (even among networked computers).

What does being spoofed mean? ›

Text message spoofing is used to send fake text messages to users that often try to get the user to click a link within the text message, which then leads them to phishing and smishing attacks.

Top Articles
Colorful Painted Houses of Capitola Village - California Through My Lens
Affirm Help Center – Search for answers and contact us
Netr Aerial Viewer
How To Fix Epson Printer Error Code 0x9e
Craigslist Parsippany Nj Rooms For Rent
Nikki Catsouras Head Cut In Half
Doby's Funeral Home Obituaries
New Day Usa Blonde Spokeswoman 2022
Canelo Vs Ryder Directv
When Is the Best Time To Buy an RV?
Stream UFC Videos on Watch ESPN - ESPN
Wunderground Huntington Beach
Charmeck Arrest Inquiry
Radio Aleluya Dialogo Pastoral
Dexter Gomovies
Epro Warrant Search
Jayah And Kimora Phone Number
Candy Land Santa Ana
Missed Connections Inland Empire
Gayla Glenn Harris County Texas Update
Boscov's Bus Trips
Stoney's Pizza & Gaming Parlor Danville Menu
Saxies Lake Worth
Delete Verizon Cloud
O'reilly's In Monroe Georgia
Fairwinds Shred Fest 2023
Xfinity Outage Map Lacey Wa
Sinfuldeeds Vietnamese Rmt
American Bully Xxl Black Panther
Craigs List Stockton
Pitchfork's Top 200 of the 2010s: 50-1 (clips)
Pawn Shop Open Now
Finland’s Satanic Warmaster’s Werwolf Discusses His Projects
Pokemon Reborn Locations
Cookie Clicker The Advanced Method
Indio Mall Eye Doctor
Infinite Campus Farmingdale
Engr 2300 Osu
Nina Flowers
Watch Chainsaw Man English Sub/Dub online Free on HiAnime.to
Searsport Maine Tide Chart
Take Me To The Closest Ups
Pas Bcbs Prefix
Craigslist Sparta Nj
Evil Dead Rise - Everything You Need To Know
53 Atms Near Me
Fresno Craglist
Festival Gas Rewards Log In
28 Mm Zwart Spaanplaat Gemelamineerd (U999 ST9 Matte | RAL9005) Op Maat | Zagen Op Mm + ABS Kantenband
Affidea ExpressCare - Affidea Ireland
Latest Posts
Article information

Author: Kieth Sipes

Last Updated:

Views: 6299

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Kieth Sipes

Birthday: 2001-04-14

Address: Suite 492 62479 Champlin Loop, South Catrice, MS 57271

Phone: +9663362133320

Job: District Sales Analyst

Hobby: Digital arts, Dance, Ghost hunting, Worldbuilding, Kayaking, Table tennis, 3D printing

Introduction: My name is Kieth Sipes, I am a zany, rich, courageous, powerful, faithful, jolly, excited person who loves writing and wants to share my knowledge and understanding with you.