Ctc Vs Coscia Case

Improved Essays
QUESTION PRESENTED
What factors do the U.S. Commodity Futures Trading Commission (“CFTC”) and Department of Justice (“DOJ”) examine to determine whether spoofing violations have occurred for prosecution under the 2010 Frank-Dodd Act? How is this demonstrated in the context of the United States v. Coscia case?
SHORT ANSWER
Intent is the biggest factor in whether the CFTC and DOJ can successfully prosecute under the anti-spoofing laws. To prove an anti-spoofing violation has occurred, the prosecutor must show that the defendants systematically placed orders they didn’t intend to execute.
After settling civil charges with both the CFTC and the U.K.’s Financial Conduct Authority, Michael Coscia (“Coscia”), head of New Jersey-based high frequency trading (“HFT”) shop Panther Energy Trading (“Panther”), was charged with six counts of commodities fraud and six criminal violations of the anti-spoofing provision of the Commodity Exchange Act (“CEA”). The
…show more content…
The CFTC’s former Enforcement Director, David Meister, stated “while forms of algorithmic trading are of course lawful, using a computer program that is written to spoof the market is illegal and will not be tolerated. We will use the Dodd-Frank anti-disruptive practices provision against schemes like this one to protect market participants and promote market integrity, particularly in the growing world of electronic trading platforms.”
While the perceived intent of anti-spoofing initiatives makes sense in order to maintain the integrity of the markets, governing bodies must collaborate in order to create more cohesive and uniform laws regulating spoofing. This initiative would streamline enforcement and clarify the scope of prohibited activity. This analysis is already underway, with experts looking at patterns of HFT that point to spoofing becoming part of the requisite conduct for CEA

Related Documents

  • Improved Essays

    The case of Stern v. Lucy Webb Hayes (1984) was a class action lawsuit in which M. Stern and the patients of Sibley Memorial Hospital sued the Lucy Webb Hayes National Training School for Deaconesses and Missionaries, five financial institutions, and five members of Sibley Memorial Hospital’s Board of Trustees. Plaintiffs alleged the defendants conspired to monetarily benefit from the financial management of the hospital through use of the financial institutions to which they were affiliated. Plaintiffs also alleged breach of fiduciary duty by trustees. During this case the plaintiffs attempted to establish the conspiracy they had alleged by presenting specific incidences to which questionable financial activity occurred.…

    • 312 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Eco/372 Week 1

    • 491 Words
    • 2 Pages

    Based on the organization you have chosen for your final research paper, respond to the following: I. Regulations: If any data involved is regulated, or if there are other legal and compliance concerns, state them in this section. The laws covering the internet are varied and quite complex in the United States with the financial system to the medical system heavily regulated. Starting off the Sarbanes-Oxley was enacted in 2002, the Sarbanes-Oxley Act is designed to protect investors and the public by increasing the accuracy and reliability of corporate disclosures. It was enacted after the high-profile Enron and WorldCom financial scandals of the early 2000s.…

    • 491 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    United States vs. Robert F McDonnell and use pills Maureen McDonnell case number 15 – 474 the Supreme Court McDowell petitioned the official Act of the conspiracy charges and conviction did not provide Pacific evidence. In 2014 Robert McDonnell, because the 71 Governor of Virginia throughout the term in office became partners with Jonnie Williams, a wealthy businessman. Williams offered favors to influence McDonnell supports with the dietary corporation at the Star Scientific Inc. Robert McDonnell and his wife, Maureen, were in financial distress. Their debt was overwhelming, and they needed a way out of their debt. Therefore, Williams agreed to reduce their deficit with loans, paid expenses and luxurious contributions.…

    • 1197 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Antitrust Laws Dbq

    • 973 Words
    • 4 Pages

    The antitrust laws were enforced to protect the competitive market for consumers, so the open- market economy could be fair and lawful. Since the beginning of time, Antitrust laws were put into place and unknowingly, consumers saved millions of dollars a year. This law was put into place to make sure companies do not gain market control. It balances economic growth and controls the invasion of monopolies and fixed prices. In doing this, they are “ making sure there are strong incentives for businesses to operate efficiently, kept prices down, and kept quality up” [1].…

    • 973 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In the past, there have been many problems with both the theory and enforcement of antidumping laws, especially in the United States. To complicate matters, the antidumping provisions adopted by GATT are somewhat different than the provisions in U.S. law, and it has not yet been determined which set of laws will prevail in antidumping actions initiated in the United States. Some have suggested that adopting the GATT antidumping provisions would amount to a partial abrogation of U.S. Sovereignty. Others deny that this would be the case. Regardless of which set of antidumping provisions is utilized, there are many common features between the GATT and U.S. rules.…

    • 878 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This legislative would not be a valid exercise of congress’ power to regulate interstae commerce. With refrence to United States v. Lopez, there are three broad categories of activities that congress have the mandate to regulate with respect to its commerce power. Firstly, “congess may regulate the use of channels of interstate commerce. Secondly, congress is empowered to regulate and protect instrumentalities of interstate commerce, even though the threat may come from intrastate activities. Lastly,, congress’ commerce authority includes those activities that substantially affect interstate commerce” (United States v. Lopez, p.276).…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Teleexfree Case Study

    • 204 Words
    • 1 Pages

    The U.S Securities and Exchange Commission alleged that Telexfree, Inc. and Telexfree, LLC that sells telephone service based on “voice over internet” technology are operating an pyramid scheme against their customers. The dependents in this case sold their membership by promising the annual returns of 200 percent or more for those who recruit new members in to the telexfree advertisements. However, Telexfree only made $1.3 million profits with VoIP sales from 2012, which is one percent more $1.1billion needed to cover its promised payment to the members who helped recruit new members for this advertisement. Because they could not pay back to its members, Telexfree started to pay the earlier investors or members with its money received from…

    • 204 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    There are three main elements of white-collar crucial for analyzing whether the defendant Julian Assange has committed a white-collar crime. The first element worth analyzing is the security fraud. Security fraud is an element which is associated with one committing crime aimed at infiltrating security issues and jeopardizing the efforts of security agencies of a state. As the main defendant in this case, Julian Assange has committed a white collar crime because of the fact that he leaked more than 250,000 cables exposing secrets crucial to U.S national security. On the other hand, through his actions, he purposefully obtained information crucial for national defense with the main intent being to maliciously expose highly guarded national security secrets, (Sanchez Estop & Juan Domingo, 2014).…

    • 1022 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Barclays Scandal

    • 1122 Words
    • 4 Pages

    Spinoff traders, and successively, Barclays above all, might have benefited throughout the scandal itself, however when and through the investigation, all parties were command answerable for the manipulation of the rates. Barclays was ordered to pay fines and its name suffered, the traders were possible terminated from employment. In this state of affairs, no party edges long run. Question 2: Who was most responsible for the manipulation of LIBOR?…

    • 1122 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Stocktrak Debrief Report Over the course of this semester, students in Finance 354 were given an opportunity to manage a practice portfolio. We were given $1,000,000 and a maximum of 400 trades. We were also able to short sale which allowed the excess of $1,000,000. The types of securities allowed to be traded included stocks, options, futures, bonds, mutual funds, international stocks, and commodities.…

    • 1174 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Civil False Claims Act

    • 942 Words
    • 4 Pages

    In 1863 the federal government enacted the Civil False Claims Act, which also came to be known as the whistle-blower statute. Despite being given a derogatory colloquial name; the statute serves an essential purpose for dependency in government contracting. The law was strengthened in 1986 to provide a penalty of tremble damages in addition to 10,000 dollars per false claim against the defendant. The “whistle-blower,” now given the more pleasant term of “relator” may now collect between 15 and 30 percent of the recovery in these “qui tam” lawsuits. The recovery reward provides a great incentive for whistle blowers to act and maintain reliability within the federal contact industry.…

    • 942 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    An array of new challenges has arisen as a result of rapidly developing technologies, as the contemporary marketplace has transformed into a complex global environment immensely difficult for Australian legal authorities to adequately regulate. Despite this, under the Competition and Consumer Act 2010 (Cth) and the Telecommunications Act 1997 (Cth), the ACCC is able to enforce Australian consumer law within national borders - and thus can offer protection to consumers in some areas of internet marketing and sales. This is demonstrated though their involvement in a “concerted international effort” (ACCC, Sept 2013) to identify app games believed to be capable of misleading consumers into making unauthorised purchases - which they asserted breached the ACL’s clause banning deceptive claims. The statutory body additionally engaged with Google and Apple platform operators in order to determine how to increase awareness and educate the public about these issues. Conversely, the Australian legal system is essentially unable to provide any form of protection or justice to consumers in the area of international online transactions, as it lacks cross-border jurisdiction and has not yet developed legislative strategies designed to resolve this issue.…

    • 1199 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    CPAs are often viewed as an elite group of professionals. By proudly earning the designation of CPA, they win respect and trust from society with their expertise and proficiency. People have never realized that certain black sheep actually are existing in those CPAs with aura while a majority of people are giving the great compliment. Mail and wire fraud are the two of categories in RICO (Racketeer Influenced and Corrupt Organizations) predicate acts. Since mail, email and telephone are the main tools of communication in the modern business, therefore, wrongdoers always commit to the Mail and wire fraud.…

    • 225 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    As a cyber-based attacking mechanism, identity spoofing can be used to accomplish a variety of tasks or goals. Notably, by assuming the identity of someone or something, a skilled attacker can gain access to some unauthorized area, by using forged credentials, or can even obtain useful details or information from other persons, based on information published within the CAPEC community (“CAPEC-151: Identity Spoofing,” 2017). As an example, an attacker who intercepts a communication between two parties, and assumes the identity of a one of the associated parties, may be able to deceive the opposing party into providing critical details, such as credentials. Likewise, identity spoofing can be used to accomplish goals relative to gaining access…

    • 234 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays