Cross-market spoofing

Alexis Stenfors, Mehrdaad Doraghi, Cristina Soviany, Masayuki Susai, Kaveh Vakili

    Research output: Working paper

    99 Downloads (Pure)

    Abstract

    Since 2013, regulatory investigations have revealed widespread manipulation and collusive practices among banks active in over-the-counter (OTC) markets. These discoveries have resulted in fines and settlements amounting to billions of US dollars, criminal proceedings and stricter regulation worldwide. However, recent legal cases and regulatory reports indicate that authorities have stepped up their efforts to crack down on so-called “cross-market spoofing”. The manipulative tactic involves a combination of a genuine order in one market and a spoof order in another, which is notoriously difficult to detect. In this paper, we use a high-frequency data set of limit order book snapshots from the foreign exchange (FX) spot market to develop and test a methodology to assess the feasibility, and hence potential prevalence, of cross-market spoofing. Our findings show that predictable reactions follow potential single-market spoofs that a market manipulator may exploit. However, we also find that predictability may be observed in closely related markets. In particular, we discover that EUR/JPY offers a reliable pathway for a manipulator to exploit via spoof orders at deeper levels in the EUR/USD or USD/JPY limit order books. Overall, our pilot study lends support to the increasing attention to cross-market manipulation by compliance officers and financial regulators.
    Original languageEnglish
    PublisherUniversity of Portsmouth
    Pages1-40
    Number of pages40
    Publication statusPublished - 1 Jun 2022

    Publication series

    NameWorking Papers in Economics & Finance

    Keywords

    • foreign exchange
    • limit order book
    • manipulation
    • market microstructure
    • spoofing
    • trading

    Fingerprint

    Dive into the research topics of 'Cross-market spoofing'. Together they form a unique fingerprint.

    Cite this