The Motivations for the Behavior of Rogue Traders

Total Page:16

File Type:pdf, Size:1020Kb

The Motivations for the Behavior of Rogue Traders The motivations for the behavior of rogue traders Thesis By Zuzana Dančová Submitted in Partial fulfillment Of the Requirements for the degree of Bachelor of Science In Business Administration State University of New York Empire State College 2020 Reader: Tanweer Ali Statutory Declaration / Čestné prohlášení I, Zuzana Dančová, declare that the paper entitled: What are the motivations for the behavior of rogue traders? was written by myself independently, using the sources and information listed in the list of references. I am aware that my work will be published in accordance with § 47b of Act No. 111/1998 Coll., On Higher Education Institutions, as amended, and in accordance with the valid publication guidelines for university graduate theses. Prohlašuji, že jsem tuto práci vypracoval/a samostatně s použitím uvedené literatury a zdrojů informací. Jsem si vědom/a, že moje práce bude zveřejněna v souladu s § 47b zákona č. 111/1998 Sb., o vysokých školách ve znění pozdějších předpisů, a v souladu s platnou Směrnicí o zveřejňování vysokoškolských závěrečných prací. In Prague, 23.4.2020 Zuzana Dančová Acknowledgement I wish to thank all the people whose assistance was a milestone in the completion of this project. I wish to express my sincere appreciation to my mentor, Tanweer Ali, who convincingly guided and encouraged me through the process of completing this project. I also wish to acknowledge my family – my caring parents, great brothers, and my patient partner. They kept me going on and this work would not have been possible without their support. I would like to recognize the invaluable assistance that you all mentioned provided during my study. Contents I. What are the motivations for the behavior of rogue traders? ........................... 6 A. Rogue traders can be a threat ............................................................................ 7 B. Is there a definition of a rogue trader? .............................................................. 8 C. Can theory predict rogue deviant behavior? .................................................. 11 D. Rogue behavior ................................................................................................ 12 E. Does rogue trading appear only occasionally? .............................................. 15 II. Possible explanations/motives ............................................................................. 17 A. Social Behavior ................................................................................................ 18 1. Age .................................................................................................................... 18 2. Isolation and attention seeking........................................................................ 19 3. Disappearance of self-control ......................................................................... 19 B. Control balance theory (CBT)......................................................................... 20 III. Overview of rogue trader’s cases ...................................................................... 24 A. Société Générale and Jérome Kerviel ................................................................ 24 B. UBS and Kweku Adoboli ................................................................................... 26 C. Barings Bank and Nicholas “Nick” Leeson....................................................... 27 IV. Case analyses......................................................................................................... 31 A. Predisposition towards deviance ........................................................................ 32 B. Constraint ............................................................................................................. 33 C. Control ratio ......................................................................................................... 34 D. Opportunity.......................................................................................................... 35 E. Self-control........................................................................................................... 36 V. Conclusion ............................................................................................................... 41 Bibliography ................................................................................................................. 45 Abstract In the financial industry, there have been several situations of huge losses in banks and the responsible person was the one in charge of the money operations, thus rogue trading is a big topic. If we compare some of the scandals, some may seem quite similar. Usually, the people behind the money breaches are men, in their early thirties and with a successful trading pattern behind them. They do not need money and they do not have any psychological problems. Or at least, there was nothing found during investigations. This may lead to the conclusion, that there are visible some patterns that can trigger illegal rogue behavior. This project focuses on the question about what are the motivations for the behavior of rogue traders. The foundation of the theoretical background in this project is the control balance theory. Secondary sources were used to research three of the main rogue trader’s cases. Then the analyses follow from the perspective of the main variables of control balance theory – predisposition towards deviance, constraint, control ratio, opportunity, self- control. The results have shown that several warning signs appear and can be classified as a predisposition towards rogue behavior. Nevertheless, even though behavioral patterns were found, each rogue trader’s case has to be examined individually. Moreover, recommendations for financial institutions are also part of the outcomes of this project. Key words: rogue, trader, behavior, Control Balance Theory, white-collar crime 6 I. What are the motivations for the behavior of rogue traders? An ordinary person who is living a normal life as a trader is one day accused of covering his large losses at the financial institution he works for with fake trades. Even though this may sound strange, there are many stories in history, as well as in recent years, that uncover tremendous losses caused by internal workers who took part in such operations for a certain period of time. Back in 1995, the news was full of headlines informing the public that a young man in his twenties set up a secret account to cover up the huge losses of a branch in Singapore. Nick Leeson was responsible for large operations in this new branch of Barings Bank and suddenly faced an allegation of committing fraud of USD 1.3 billion. Market traders around the world were shocked (Jennings, 2011). Several years later, more cases of such losses appeared. In 2008, Jerome Kerviel faced the consequences of suspicious future trading, resulting in a loss of USD 6.7 billion in Societe Generale Bank. In 2011, Kweku Adoboli was arrested for losing USD 2.3 billion at UBS Corporation (Meek, 2013). How is it possible that such big positions are uncovered? Who are these so-called rogue traders? In my Senior Project Thesis, I will deal with the behavior of rogue traders and I will try to explain possible motives that lead to such behavior. Rogue trading is a popular topic since there have been several situations where banks faced large losses and the person responsible was the one who was responsible for the money operations. If we compare some of the scandals, some may seem quite similar. Usually, the person behind the money breaches are men in their early thirties that have a successful trading pattern. They are not in need of 7 money and they do not have any psychological problems. Or at least, there was nothing found during the investigations. This can lead to the premise that there are some visible patterns that can trigger illegal rogue behavior. In this project, I focus on the motivational factors behind rogue traders’ behavior from an individual’s perspective. I mostly use different secondary sources to research the theoretical framework of this topic as well as several possible points of view on the possible explanations. The control balance theory is briefly applied at the beginning to explain the behavior and it is explained in individual section as it serves as the framework for future analysis. Later, several cases are described with a focus on the unethical methods and signs that could be seen as warning signs to prevent this behavior. Based on the theoretical background described in the first part, mostly done by applying the control balance theory, cases are analyzed with, again, help of secondary sources and the conclusion is drawn from this investigation. A. Rogue traders can be a threat There are sensible reasons for why operational managers fear rogue traders. They often operate alone and have an unrecognizable pattern of behavioral reactions. As a result, they are almost impossible to detect. In recent years, several cases of fraud that were caused by traders were brought to light. Operational managers often have to ask themselves what adds up to make a rogue trader who can cause a fraudulent scandal worth billions of dollars. The word fraud is now related to the so-called fraud diamond. This involves having opportunity, motivation, rationalization, and the skills needed to actually commit fraud. However, why would anyone put themselves at high risk for being caught? The prerequisites for rogue behavior are uncertain, too (Meek, 2013).
Recommended publications
  • Using Oracle Commerce
    Using Oracle Commerce F41708-01 July 2021 Using Oracle Commerce, F41708-01 Copyright © 1997, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Gram for Sechelt May Day E Accomplishments at Gibsons
    XT l' u * _• i» w • •*• —« — PROVINCE AI Victoria, -B Phone your news or orders to mons •j -. -;u Seventh Year ofPublication ThtirstJay May 14, 1953 r <Vol 7-19 Published in GIBSONS, B.C. Serving the Sunny Sechelt Peninsula upen House Pender Hospital ; Sunday, May 2l|hj St. Mary's Hospital at Pender|Harbour will open its doors and welcome all At Sechelt on May 7th, a good crowd filled the Legion Hall to^ comers who would like to in­ hear the Liberal Candidate for the Mackenzie Riding, Mr Batt spect, or just visit,lor who would Maclintyre. Capt. A. Johnston was chairman for the meeting, and like to see demonstrations of presented Mr. Maclntyre and his campaign manager, Mr. Harry Hospital Equipment/in use. Davies, from Powell River. Batt announced the Liberal platform in its broader aspects, and then went into some detail on several Marda Walker Wendy Yates Judy Gray The Hospital Committee ad­ vises that from one hi the after­ points immediately concerning most listeners. noon until eight, in, the evening, The practice of /paying for — visitors will be -welcome, and Roads and kindred Provincial gram For Sechelt May Day especially schoot^students. expenditures by the long-term During the "afternoon, light loan method was fully covered. m WSfc If planning, rehearsing and at­ President Orv Moscrip will MC refreshments will be. served to Mr. Maclntyre explained that tention to detail are any criter- the day. those who wish. our anticipated revenue from ian for success, Sechelt is slated The -retiring queen is Diana the three cent share of the gas­ # The committee Chairman sta­ 1 for the most outstanding May Wheel%, daughter of Mr., and tes that there have been several oline tax was used as collateral Day in its history of May Days.
    [Show full text]
  • 2020 05 11 Reynolds Et Al Ethical Accepted
    UWS Academic Portal When ethical leaders are ‘no longer at ease’ Kasonde, Mukuka; Reynolds, Kae E-pub ahead of print: 30/09/2020 Document Version Peer reviewed version Link to publication on the UWS Academic Portal Citation for published version (APA): Kasonde, M., & Reynolds, K. (2020). When ethical leaders are ‘no longer at ease’: the role of social vice in corruption through the lens of a Nigerian novel. Paper presented at British Academy of Management 2020 Conference in the Cloud, . General rights Copyright and moral rights for the publications made accessible in the UWS Academic Portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 02 Oct 2021 When ethical leaders are ‘No Longer at Ease’: The role of social vice in corruption through the lens of a Nigerian novel Mukuka Kasonde*, University of Huddersfield Kae Reynolds, University of the West of Scotland Queensgate Huddersfield HD1 3DH United Kingdom *[email protected] 1 When ethical leaders are ‘No Longer at Ease’: The role of social vice in corruption through the lens of a Nigerian novel Word count: 6592 Abstract This paper addresses the social context of corruption through literary analysis of Chinua Achebe’s (1960) novel No Longer at Ease. By exploring the societal influences that may lead an individual to engage in unethical behaviour, the analysis challenges the more predominant view of ethical failure as individual vice and reframes corruption as socially embedded.
    [Show full text]
  • Barings Bank Disaster Man Family of Merchants and Bankers
    VOICES ON... Korn Ferry Briefings The Voice of Leadership HISTORY Baring, a British-born member of the famed Ger- January 17, 1995, the devastating earthquake in Barings Bank Disaster man family of merchants and bankers. Barings Kobe sent the Nikkei tumbling, and Leeson’s losses was England’s oldest merchant bank; it financed reached £827 million, more than the entire capital the Napoleonic Wars and the Louisiana Purchase, and reserve funds of the bank. A young rogue trader brings down a 232-year-old bank. and helped finance the United States government Leeson and his wife fled Singapore, trying to “I’m sorry,” he says. during the War of 1812. At its peak, it was a global get back to London, and made it as far as Frankfurt financial institution with a powerful influence on airport, where he was arrested. He fought extradi- the world’s economy. tion back to Singapore for nine months but was BY GLENN RIFKIN Leeson, who grew up in the middle-class eventually returned, tried, and found guilty. He was London suburb of Watford, began his career in sentenced to six years in prison and served more the mid-1980s as a clerk with Coutts, the royal than four years. His wife divorced him, and he was bank, followed by a succession of jobs at other diagnosed with colon cancer while in prison, which banks, before landing at Barings. Ambitious and got him released early. He survived treatment and aggressive, he was quickly promoted settled in Galway, Ireland. In the past to the trading floor, and in 1992 he was “WE WERE 24 years, Leeson remarried and had two appointed manager of a new operation sons.
    [Show full text]
  • Law and Economics Yearly Review
    Volume 4 – Part 2 – 2015 ISSN 2050-9014 ISSUES ON FINANCIAL LAW AND MARKET REGULATION, ECONOMICS BUSINESS DEVELOPMENT AND YEARLY GOVERNMENT’S POLICIES ON REVIEW GLOBALIZATION Editors F. CAPRIGLIONE – R. M. LASTRA – R. MCCORMICK C. PAULUS – L. REICHLIN – M. SAKURAMOTO in association with LAW AND ECONOMICS YEARLY REVIEW www.laweconomicsyearlyreview.org.uk Mission The “Law and Economics Yearly Review” is an academic journal to promote a legal and eco- nomic debate. It is published twice annually (Part I and Part II), by the Fondazione Gerardo Capriglione Onlus (an organization aimed to promote and develop the research activity on fi- nancial regulation) in association with Queen Mary University of London. The journal faces questions about development issues and other several matters related to the international con- text, originated by globalization. Delays in political actions, limits of certain Government’s policies, business development constraints and the “sovereign debt crisis” are some aims of our studies. The global financial and economic crisis is analysed in its controversial perspectives; the same approach qualifies the research of possible remedies to override this period of progressive capitalism’s turbulences and to promote a sustainable retrieval. Address Fondazione Gerardo Capriglione Onlus c/o Centre for Commercial Law Studies Queen Mary, University of London 67-69 Lincoln’s Inn Fields London, WC2A 3JB United Kingdom Main Contact Fondazione G. Capriglione Onlus - [email protected] Editor‐ in‐ Chief F. Capriglione Editorial Board G. Alpa - M. Andenas - A. Antonucci - R. Olivares-Caminal - G. Conte - M. De Marco - M. Hirano - I. MacNeil - M. Martinez - M. Pellegrini - C. Schmid - M. Sepe - A.
    [Show full text]
  • Why Increased Data Threats Are Driving Draas Adoption.Ai
    Why Increased Data Threats Are Driving THREATS are coming from internal and external sources EXTERNAL THREATS INTERNAL THREATS Cyber Attacks Viruses Equipment Loss Application Specific Hacks Phishing Email Actions Phishing Human Error BYOD + IoT Adoption Disgruntled Employees Natural Disasters Excessive Access Levels Insufficient Employee Vetting Social Engineering SECURITY THREATS ARE INCREASING BUT SO ARE NATURAL th 2017 Hurricane Season is 7th most active in DISASTERS 7U.S. History 2017 ITIT prospros areare rethinkingrethinking Incidents of ransomware in healthcare are on the rise, causing 72% of the industry’s cyber security IT downtime costs are estimated attacks. Are you prepared? at $26.5 billion in lost revenue. Can your company afford to not have a disaster recovery plan in place? Customers expect 24x7 availability. Downtime generally means a loss of clients and revenue. COMPLIANCE & AUDITS RAPID DATA GROWTH DOWNTIME Businesses need to keep data for COSTS 90% of all the data in the world has compliance, audit or tax purposes. been generated over the last two Don’t assume the right technology years. You can no longer keep buying is in place. Having only one copy of more disc space. Today’s companies data is generally a huge mistake. need a better approach to data management and disposal. MACHINE & MAN-MADE FAILURE DIFFERENT DATA SOURCES Combined, technology and human NEED PROTECTION error account for over 50% of data With the evolution of the cloud, loss. This means that your business companies must protect, on-premise data has a 50% chance of loss due data as well as cloud-native apps. to simple man or machine-made The old technologies just can’t cut it.
    [Show full text]
  • Chapter 5 Role of Cognitive and Other Influences on Rogue Trader
    Chapter 5 Role of Cognitive and Other Influences on Rogue Trader Behaviour: Findings from Case Studies 5.1. Introduction One of the key findings from Chapter 4 was the lack of significant difference in the financial decision-making behaviour of investment professionals compared with retail investors in the survey sample. However, there was a distinctive pattern in the odds ratio in Table 4.5 where investment professionals were seen to be more likely to be affected by behavioural biases when the choices were risky ones. The aim of the discussions and analyses of the selected case studies in this chapter (the qualitative element of the mixed methods approach), therefore, was to investigate the reasons behind the seeming inability or reluctance of investment professionals to ignore the influence of behavioural biases under high risk situations; where their actions could result in either extremely large monetary gains or losses. The discussion in this chapter consisted of three main sections. The first section was a brief account of the events behind five high-profile financial scandals caused by individuals who engaged in unauthorised trading or investment activities on behalf of their financial institutions, or rogue traders as they were popularly known. Section two highlighted some common characteristics of the rogue trading incidents, and section three was an analysis of the behavioural biases and related emotional influences behind the conduct of rogue traders. 132 5.2. Case Studies on Rogue Trading Rogue trading is the term popularly used to describe unauthorised proprietary trading activities by financial market professionals. These trading activities which resulted in significant monetary losses and severe reputational damage to the affected financial institutions more often than not involved transactions in derivative products.
    [Show full text]
  • Société Générale and Barings
    Volume 17, Number 7 Printed ISSN: 1078-4950 PDF ISSN: 1532-5822 JOURNAL OF THE INTERNATIONAL ACADEMY FOR CASE STUDIES Editors Inge Nickerson, Barry University Charles Rarick, Purdue University, Calumet The Journal of the International Academy for Case Studies is owned and published by the DreamCatchers Group, LLC. Editorial content is under the control of the Allied Academies, Inc., a non-profit association of scholars, whose purpose is to support and encourage research and the sharing and exchange of ideas and insights throughout the world. Page ii Authors execute a publication permission agreement and assume all liabilities. Neither the DreamCatchers Group nor Allied Academies is responsible for the content of the individual manuscripts. Any omissions or errors are the sole responsibility of the authors. The Editorial Board is responsible for the selection of manuscripts for publication from among those submitted for consideration. The Publishers accept final manuscripts in digital form and make adjustments solely for the purposes of pagination and organization. The Journal of the International Academy for Case Studies is owned and published by the DreamCatchers Group, LLC, PO Box 1708, Arden, NC 28704, USA. Those interested in communicating with the Journal, should contact the Executive Director of the Allied Academies at [email protected]. Copyright 2011 by the DreamCatchers Group, LLC, Arden NC, USA Journal of the International Academy for Case Studies, Volume 17, Number 7, 2011 Page iii EDITORIAL BOARD MEMBERS Irfan Ahmed Devi Akella Sam Houston State University Albany State University Huntsville, Texas Albany, Georgia Charlotte Allen Thomas T. Amlie Stephen F. Austin State University SUNY Institute of Technology Nacogdoches, Texas Utica, New York Ismet Anitsal Kavous Ardalan Tennessee Tech University Marist College Cookeville, Tennessee Poughkeepsie, New York Joe Ballenger Lisa Berardino Stephen F.
    [Show full text]
  • The Return of the Rogue
    THE RETURN OF THE ROGUE Kimberly D. Krawiec∗ The “rogue trader”—a famed figure of the 1990s—recently has returned to prominence due largely to two phenomena. First, recent U.S. mortgage market volatility spilled over into stock, commodity, and derivative markets worldwide, causing large financial institution losses and revealing previously hidden unauthorized positions. Second, the rogue trader has gained importance as banks around the world have focused more attention on operational risk in response to regulatory changes prompted by the Basel II Capital Accord. This Article contends that of the many regulatory options available to the Basel Committee for addressing operational risk it arguably chose the worst: an enforced self- regulatory regime unlikely to substantially alter financial institutions’ ability to successfully manage operational risk. That regime also poses the danger of high costs, a false sense of security, and perverse incentives. Particularly with respect to the low-frequency, high-impact events—including rogue trading—that may be the greatest threat to bank stability and soundness, attempts at enforced self- regulation are unlikely to significantly reduce operational risk, because those financial institutions with the highest operational risk are the least likely to credibly assess that risk and set aside adequate capital under a regime of enforced self-regulation. ∗ Professor of Law, University of North Carolina School of Law. [email protected]. I thank Susan Bisom-Rapp, Lissa Broome, Bill Brown, Steve Choi, Deborah DeMott, Anna Gelpern, Mitu Gulati, Donald Langevoort, Marc Miller, Eric Posner, Steve Schwarcz, Jonathan Wiener, David Zaring, and workshop participants at the University of Arizona James E.
    [Show full text]
  • Cyber Frauds, Scams and Their Victims 1St Edition Pdf, Epub, Ebook
    CYBER FRAUDS, SCAMS AND THEIR VICTIMS 1ST EDITION PDF, EPUB, EBOOK Mark Button | 9781138931206 | | | | | Cyber Frauds, Scams and their Victims 1st edition PDF Book Defamation Invasion of privacy Intrusion on Seclusion False light Breach of confidence Abuse of process Malicious prosecution Alienation of affections Criminal conversation Seduction Breach of promise. Big Data Saswat Sarangi author Apart from fraud, there are several related categories of intentional deceptions that may or may not include the elements of personal gain or damage to another individual:. While the precise definitions and requirements of proof vary among jurisdictions, the requisite elements of fraud as a tort generally are the intentional misrepresentation or concealment of an important fact upon which the victim is meant to rely, and in fact does rely, to the harm of the victim. Given the international nature of the web and ease with which users can hide their location, obstacles to checking identity and legitimacy online, and the variety of hacker techniques available to gain access to PII have all contributed to the very rapid growth of Internet fraud. April Cyber security officials in the UK begin to worry as the BBC demonstrates how easy it is to purchase fraudulent rail tickets via the dark web. A year-old-boy was arrested in Northern Ireland for attempting to purchase a Soviet era submachine gun on the dark web. Retrieved 18 September Compounding Malfeasance in office Miscarriage of justice Misprision Obstruction Perjury Perverting the course of justice. Beyond laws that aim at prevention of fraud, there are also governmental and non-governmental organizations that aim to fight fraud.
    [Show full text]
  • Volitamata Kauplemine Finantsturgudel
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by DSpace at Tartu University Library TARTU ÜLIKOOL Majandusteaduskond Ettevõttemajanduse instituut Darja Medvedskaja VOLITAMATA KAUPLEMINE FINANTSTURGUDEL Bakalaureusetöö Juhendaja: lektor Mark Kantšukov Tartu 2012 1 Soovitan suunata kaitsmisele ………………………………….. (juhendaja allkiri) Kaitsmisele lubatud “ “........................ 2012. a. …...… õppetooli juhataja ………………………… (õppetooli juhataja nimi ja allkiri) Olen koostanud töö iseseisvalt. Kõik töö koostamisel kasutatud teiste autorite tööd, põhi- mõttelised seisukohad, kirjandusallikatest ja mujalt pärinevad andmed on viidatud. ………………………………….. (töö autori allkiri) 2 SISUKORD Sisukord ............................................................................................................................3 Sissejuhatus.......................................................................................................................4 1. Volitamata kauplemine finantsturgudel – teoreetiline käsitlus.....................................7 1.1. Volitamata kauplemine kui valgekraede kuritegude üks liikidest .........................7 1.2. Volitamata kauplemise tunnused ja põhjused......................................................18 1.3. Volitamata kauplemist puudutavad aktid ja pankade operatsiooniriski juhtimine .....................................................................................................................................24 2. Volitamata kauplemise juhtumite analüüs ..................................................................37
    [Show full text]
  • Keeping Rogue Traders at Bay
    Portfolio Media. Inc. | 860 Broadway, 6th Floor | New York, NY 10003 | www.law360.com Phone: +1 646 783 7100 | Fax: +1 646 783 7161 | [email protected] Keeping Rogue Traders At Bay Law360, New York (October 04, 2011, 4:27 PM ET) -- On Sept. 16, 2011, Kweku Adoboli, a native of Ghana and UBS AG employee, was charged with fraud arising out of unauthorized trading. UBS estimates that Adoboli’s rogue trading continued for three years and caused it to incur losses of $2.3 billion. Banks, lawyers and other industry specialists are all posing the same question: Given UBS’ sophisticated risk procedures, how did Adoboli’s rogue trading go undetected for so long? And what lessons can the industry learn? A Little Background Adoboli joined UBS’ London investment banking division as an analyst in 2003 after graduating, with honors, from the University of Nottingham in England. Adoboli served a so-called “back-office” function: He entered and confirmed trades, handled accounting issues and transmitted payments. In September 2006, he began trading exchange-traded funds (ETFs) on UBS’ “Delta-One” trading desk. The trading involves two steps. First, a client initiates a trade in an ETF that bets on the direction of a group of stocks, such as European or U.S. stocks. The trader executes the trade and acquires the basket for UBS. Second, the trader hedges the trade by creating a mirror trade of the bet. Adoboli skipped the second step and made unauthorized unhedged trades on the direction of European and U.S. stock markets using UBS funds.
    [Show full text]