Slow finality in the traditional banking system means there is a delay between when transactions are approved, and when money moves. This is a story about the unreasonable effectiveness of slow finality, and the laws that make it thus. Here I look at two recent cyber bank heists, one of which was stopped by slow finality, and one which was not. I then look at the laws around banks' obligations to stop fraudulent transfers, and conclude there is very strong regulatory pressure for banks to stop fraudulent wire transfers, and banks are good at it.
The 2016 Bangladesh Bank robbery (BBR) and 2015–2016 SWIFT banking hacks (SBH) both involve valid-but-malicious SWIFT money transfer requests. In the BBR, slow finality prevented most of the money from being stolen, in the SBH slow finality was unsuccessful and the malicious transfers were not detected before finalizing.
I won't say much about the BBR as it is the less interesting of the two, for the most part it is a success story of slow finality. Hackers sent malicious money transfers from a bank, they were noticed before they finalized, and were stopped. On a blockchain, this would be like if someone stole your private key but was unable to steal your money. It's really cool.
The SBH are a different story. In that case the hackers were careful to cover their tracks, and a malicious SWIFT transfer request from the Ecuadorian Banco del Austro (BDA) to Wells Fargo was processed. Despite the transfer request appearing valid, and Wells Fargo following SWIFT procedure, Wells Fargo was later sued by the BDA that these security procedures were insufficient.
Wells Fargo's request to dismiss was denied, and two years later BDA and Wells Fargo reached a private settlement. There are a lot of reasons that a private settlement could have happened, but here's the vibe I get: it would have been, monetarily, positive expected value for Wells Fargo to fight the lawsuit, but the strictness and vagueness of US regulation around slow finality meant a low-probability loss would have set a strict (read, expensive) judicial construction of the regulation.
In the US, responsibility for fraudulent wire transfers is governed byArticle 4A of the Uniform Commercial Code (UCC) which establishes, banks must:
In the SBH, Wells Fargo's security procedures were to comply with SWIFT transfer requests. Wells Fargo argues that SWIFT has good security procedures and then satisfies the article 4A requirements by executing them in good faith.
On the other hand, BDA argues that SWIFT alone is insufficient procedure and that Wells Fargo had sent them some (seemingly non-legally binding) communication indicating they had a process in addition to the one laid out by SWIFT.
So there seems to be some consensus in the court that complying with SWIFT security procedures is the name of the game.
Putting threads together, here's the story:
My two takeaways are:
Another interesting fact in favor of how powerful Article 4A is comes from this quote from Reuters:
Lacking legal action, and knowing how tenuous the case for legal action was, most of the lost funds were returned voluntarily! The entire lawsuit is around the $0.5M that was not, the unreasonable effectiveness of slow finality, and the laws that make it thus.