17.03.2013 Views

JPMORGAN CHASE WHALE TRADES: A CASE HISTORY OF DERIVATIVES RISKS AND ABUSES

JPMORGAN CHASE WHALE TRADES: A CASE HISTORY OF DERIVATIVES RISKS AND ABUSES

JPMORGAN CHASE WHALE TRADES: A CASE HISTORY OF DERIVATIVES RISKS AND ABUSES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

267<br />

At the same time, as described in Chapter V, the CIO had allowed the SCP to repeatedly<br />

breach the risk limits and metrics it had in place. Rather than react to those breaches by reducing<br />

the risky trading activities and assets in the SCP, the CIO traders instead reacted to the breaches<br />

– of Value-at-Risk, Comprehensive Risk Measure, CS01, CSW10%, and stop loss limits – by<br />

disregarding the limit or metric, raising the relevant limit to end the breach, or changing the<br />

model evaluating the risk to lower the SCP’s risk profile. 1506 In one case, the CIO’s risk officers<br />

allowed the CIO to breach a credit spread risk limit by more than 1,000% for over two<br />

months. 1507<br />

In addition to problems with its risk limits and metrics, the CIO had an overdue Matter<br />

Requiring Attention from the OCC from 2010, regarding its need to document its portfolio<br />

1508<br />

decision-making process, and had recently been told in an Internal Audit report that its asset<br />

valuation practices “need[ed] improvement.” 1509 Two days before the April 13 earnings call,<br />

Chief Risk Officer John Hogan emailed Mr. Braunstein and others about the discrepancy<br />

between CIO’s risk management procedures and the more robust Investment Bank (IB) system:<br />

“This is the governance used in the IB to control what is currently going on in CIO. We<br />

(obviously) need to implement this in CIO as soon as possible.” 1510<br />

In the April 13 8-K filing and earnings call, Mr. Braunstein made no mention of the CIO<br />

or SCP risk deficiencies or the many risk limit breaches triggered by the SCP during the first<br />

quarter of 2012, even though investors likely would have wanted to know that the whale trades<br />

had breached all of the relevant risk limits during the first quarter, and many of those breaches<br />

were ongoing. That information would have certainly weighed against the false impression that<br />

Mr. Braunstein imparted: that the whale trades were known to and had been approved by the<br />

bank’s risk managers.<br />

A month later, in the May 10 10-Q business update call, Mr. Dimon admitted serious risk<br />

management failings in connection with the SCP. 1511<br />

That those risk management deficiencies<br />

were of interest to investors and analysts was shown, not only by the questions asked during the<br />

May 10 call, but also in later communications with the bank. JPMorgan Chase emails show that,<br />

required only annually, as opposed to semi-annually. Notwithstanding this requirement, prior to May 2011, the last<br />

review of all CIO limits was conducted by CIO in 2009.”).<br />

1506<br />

See Chapter V, “Disregarding CIO Risk Metrics” section.<br />

1507<br />

See 4/19/2012 email from Peter Weiland, CIO, to James Hohl, OCC, “Info on VaR, CSBPV, and stress status<br />

and limits,” OCC-SPI-00022340 (In response to a CSBPV breach of 1074% over 71 days, Mr. Weiland told the<br />

OCC: “We are working on a new set of limits for synthetic credit and the current CS01 will be replaced by<br />

something more sensible and granular.”).<br />

1508<br />

See 12/8/2010 Supervisory Letter JPM-2010-80, OCC-SPI-00011201 [Sealed Exhibit]. The letter was copied to<br />

Jamie Dimon, Douglas Braunstein, Barry Zubrow, Stephen Cutler, and others. For more information about this<br />

letter, see Chapter VI.<br />

1509<br />

See 3/30/2012 email from William McManus, JPMorgan Chase, to Douglas Braunstein, JPMorgan Chase, and<br />

others, “Audit Report: EMEA CIO Credit- Market Risk and Valuation Practices (Rating Needs Improvement),”<br />

JPM-CIO-PSI 0009289. Mr. Braunstein told the Subcommittee that he did not recall reading the report at that time.<br />

Subcommittee interview of Douglas Braunstein, JPMorgan Chase (9/12/2012). He also noted that the CIO wasn’t<br />

given the lowest rating that it could have been given on the Internal Audit’s rating spectrum. Id.<br />

1510<br />

4/11/2012 email from John Hogan, JPMorgan Chase, to Jes Staley, IB, Douglas Braunstein, JPMorgan Chase,<br />

and others, “Credit risk limits,” JPM CIO PSI 0001086.<br />

1511<br />

See 5/10/2012 “Business Update Call,” JPMorgan Chase transcript, at 4,<br />

http://i.mktw.net/_newsimages/pdf/jpm-conference-call.pdf.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!