LiquidMetrix to Short Articles

Oct 2015

Detecting Market Abuse Is About To Get Harder

Short Article e


The original Market Abuse Directive (MAD) came into force in 2005, pre-dating MiFID 1 by a couple of years. Since 2005 there have been huge changes to the way markets operate. In equity markets alone we've seen lit market fragmentation, HFT gaming, the rise of MTF and Broker operated Dark Pools and an order of magnitude increase in the speed, volume and complexity of trading.

The core principles for detecting Market Abuse remain the same now as in 2005:

  • identify those profiting from access to information they should not use, i.e. insider dealing, client front running, trading ahead of embargoed news events
  • identify those attempting to manipulate market prices or data to mislead other participants and create profitable trading opportunities (layering, spoofing, reference price manipulation)

However, although the basic principles remain the same, the ways in which a potential market abuser might operate have multiplied markedly since 2005 due to increased market complexity.

Consider this example taken from public market data (identities of participants unknown to us).

  • Figure A shows a multi-venue order book with all orders on European lit venues for a UK stock.
  • The best European offer price of 621 at this instant is based on 300 shares resting on the LSE (blue background). The order book is interesting in that other than those 300 shares there are no other competitive offer prices on the LSE.
  • A millisecond later, the 300 shares on the LSE are cancelled (not traded).
  • A few milliseconds after the cancellation a trade for exactly 300 shares was registered on a Dark Pool at the (then badly skewed) LSE mid-price of 622.5. This was clearly a very bad price for the buyer on the dark pool as it was significantly above the offer prices available on MTF lit venues. It would be safe to assume the aggressor in this trade was the seller.

That's the story form the public tapes, Now let's think what might have actually happened.

  • Maybe the owner of the 300 shares on LSE cancelled the 300 resting shares and someone else chose that instant to aggress the Dark Pool obtaining the favourable selling price. In this case the aggressive trade to the Dark pool was possibly opportunistic, but it would be hard to classify this as market abuse by that participant, they simply took advantage of a visible price anomaly.
  • Maybe the owner of the 300 shares decided to cancel their order and send an IOC sell order to a set of Dark pools in the hope of finding liquidity there rather than waiting for a fill on the LSE. If this was an algorithm that would have re-posted the 300 shares onto the LSE again if no Dark Pool match was found, then it would be harsh to characterise this as abusive behaviour.
  • Maybe the owner of the 300 shares identified the opportunity that by cancelling their own order they would badly skew the LSE mid-price such that they would obtain an instantly profitable position if they managed to hit a Dark Pool (they could immediately buy back any shares they sold on the Dark Pool on a number of MTFs with lower offer prices).

The point of this example is to illustrate how increased complexity both creates new opportunities for people wanting to profit by manipulating market prices and also at the same time makes detection of such activity more challenging.

Recognising the changes to how markets operate nowadays, the new Market Abuse Regulation (MAR) agreed in 2014 and due to come into force 3rd July 2016 will significantly expand the remit of what types of market abuse firms will need to monitor and be held accountable for. In terms of our example above, the new provisions specifically identify the need to monitor transactions on multiple trading venues including MTFs.

They also emphasise analysing not just trades but also actions such as modifying or cancelling orders where this might indicate insider knowledge or is an attempt to manipulate market prices. Our example began not with a trade but with an order cancellation.

The other major extension is that trading in several non-equity products will also come into focus and cross asset manipulations (manipulate spot to affect derivative etc.) must also be detected.

Upgrading systems to meet the challenge of looking for these new high frequency, multi market, multi asset type abuse cases will be challenging as it will require a much deeper analysis of market activities surrounding trades than was previously required. On the plus side though, many firms will have already invested in upgrading algorithms / TCA systems to meet the challenges posed by fragmentation and high frequency trading, so significant synergies with this work should be possible.

After all one person's Best Execution failure might well be as a result of another person's Market Abuse. The systems for detecting both are similar in technique if not emphasis.

The above analysis was done using a LiquidMetrix WorkStation. Please click here to find out more.


The information contained within this website is provided for information purposes only. IFS will use reasonable care to ensure the accuracy of the information within this site. However, IFS will not be held liable for any errors in the information provided within this website or for accuracy or completeness of the information, or for delays, interruptions or omissions therein, any difficulties in receiving or accessing the website and/or for any loss direct or indirect (including without limitation, loss of profits or consequential loss and indirect, special or consequential damages) howsoever arising and whether or not caused by the negligence of IFS, its employees or agents. The information contained within this site may be changed by IFS at any time.

The information available within this website may include ‘Evaluations’ which are not reflections of the transaction prices at which any securities can be purchased or sold in the market but are mathematically derived approximations of estimated values. Nevertheless, reference may sometimes be made to Evaluations as pricing information, solely for convenience or reference. Evaluations are based upon certain market assumptions and evaluation methodologies reflected in proprietary algorithms and may not conform to trading prices or information available from third parties. No liability or responsibility is accepted (and all such liability is hereby excluded) for any information or ‘Evaluations’.

The copyright of this website and all its content belongs to IFS. All other intellectual property rights are reserved. Redistribution or reproduction of the information and data contained within this website is prohibited without the prior written permission by IFS. is an Intelligent Financial Systems Service: ©Copyright IFS 2009

Data Protection

We take our obligations under the following Data Protection legislation very seriously and have taken steps to ensure full compliance

EC Directive 95/46/EC (up to and including 24th May 2018); and
(ii) the Data Protection Act 1998 (up to and including 24th May 2018); and
(iii) the GDPR (from and including 25th May 2018); and
(iv) Replacement National Legislation; and
(v) the Privacy and Electronic Communication Regulations 2003; and
(vi) any judicial or administrative interpretation of them, any guidance, guidelines, codes of practice, approved codes of conduct or approved certification mechanisms issued by any relevant Supervisory Authority,

This is a statement of the data protection policy adopted by IFS Ltd.

As a company that spans the fields of Market Share Analysis and Sales Data analysis, IFS Ltd can be defined as both data controller and data processor. The collection of data for our own database products, plus the need to hold information about individuals, employees, clients and suppliers, defines our responsibility as a data controller. Parallel to this, the work undertaken for many of our customers requires us to hold and manipulate our clients' data. In this capacity we are a data processor.

Specifically, the Principles of the Data Protection require that personal data:
Therefore, IFS Ltd will, through appropriate management, and strict application of criteria and controls:
In addition, IFS Ltd will ensure that: