JP Morgan Algorithm Identifies Rogue Employees

Image result for JP Morgan Algorithm Identifies Rogue Employees

JPMorgan Chase & Co., which has racked up more than $36 billion in legal bills since the financial crisis, is rolling out a program to identify rogue employees before they go astray, according to Sally Dewar, head of regulatory affairs for Europe, who’s overseeing the effort. Dozens of inputs, including whether workers skip compliance classes, violate personal trading rules or breach market-risk limits, will be fed into the software.


“It’s very difficult for a business head to take what could be hundreds of data points and start to draw any themes about a particular desk or trader,” Dewar, 46, said last month in an interview. “The idea is to refine those data points to help predict patterns of behavior.”

JPMorgan’s surveillance program, which is being tested in the trading business and will spread throughout the global investment banking and asset-management divisions by 2016, offers a glimpse into Wall Street’s future. An industry reeling from billions of dollars in fines for the actions of employees who rigged markets, cheated clients and aided criminals is turning to technology to police itself better. Failure to do so will provide ammunition for those pushing to separate trading operations from retail banks.

At New York-based JPMorgan, the world’s biggest investment bank by revenue, the push comes after government probes into fraudulent mortgage-bond sales, the $6.2 billion London Whale trading loss, services provided to Ponzi-scheme operator Bernard Madoff and the rigging of currency and energy markets.
The company has hired 2,500 compliance workers and spent $730 million over the past three years to improve operations. Job postings show it is building a surveillance unit to monitor electronic and telephone communication in the investment bank.

E-mails, chats and telephone transcripts can be analyzed electronically to determine if employees are trying to collude or conceal intentions, said Tim Estes, chief executive officer of Digital Reasoning Systems Inc.
And some employees, who wish to remain anonymous, said that there was a distinct growing paranoia about the monitoring of employees that was going on at JP Morgan in London. 

Automated surveillance is necessary for Wall Street firms because billions of e-mails flow through each bank annually, overwhelming the ability of people to monitor them, according to Estes. Still, technology that predicts behavior, as in the 2002 science-fiction movie “Minority Report,” in which Tom Cruise plays a Precrime officer who hunts down murder suspects before they can act, raises ethical questions.


Information-Management:  

« Baltimore Police Use ‘Stingray’ Cellphone Surveillance
Human Rights Activists Want to Ban ‘Killer Robots’ »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

CYSEC NG

CYSEC NG

Cyber Security Challenge Nigeria Initiative (CYSEC NG) is the first, and largest offensive premier Cyber Conference and Hacking event in Africa.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

Arctic Group

Arctic Group

Arctic Group is a Swedish service provider focusing on cybersecurity, integration services and deployment of software development tools.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.