Global Shadow Banking Monitoring Report 2012 (2012年全球影子银行监控报告)

合集下载

LSEG World-Check One 客户对手风险识别系统说明书

LSEG World-Check One 客户对手风险识别系统说明书

of Politically Exposed Person (PEP) relationships and networks, and is customisable to identify a variety of specific third-party risks.The platform enables:−Advanced name-matching algorithms−Rich data−Secondary matching−Fewer false positives−Faster match resolution−Batch upload−Ongoing rescreening−Superior relevant media content screening Leverage LSEG World-Check, software and servicesWorld-Check One combines World-Check with the next generation of screening software. The software is built to maximise our proprietary World-Check data, capitalising on the powerof multiple secondary identifiers and additional information fields. With Enhanced Due Diligence reports and our Screening Resolution Service, organisations can focus on the recordsthat matter most.Screening software designed for World-Check−LSEG World-Check−Single name checks for manual name checking−Initial and ongoing screening of millions of records−Batch Screening−API with Zero Footprint Screening−A user interface available in multiple languages−Watchlist Screening that enables the user to upload in-house and third-party lists to screen against −Media Check AI-powered negative media screening tool, which pinpoints the media content most relevant to helping you meet your regulatory and legislative compliance requirements also available as an optional add-on via the World-Check One API−Identify Ultimate Beneficial OwnershipPowered by market-leading Dun & Bradstreet UBO data, our opt-in feature UBO Check lets you search and screen for regulatory and reputational risk with World-Check Risk Intelligence, all on one platform−Improved workflowOur enhanced case management functionality facilitates better visibility and improved breakdownof records, to help speed up the remediation process−Vessel due diligenceWith IHS Maritime data, check vessels for ownership structure and IMOs, and screen for any sanction and/or regulatory risk with World-Check all on our Vessel Check feature−Identity VerificationIdentity Check enables organisations to verify the identity of individuals and businesses through adata-based identity verification approach, utilising independent and authoritative identity data sources.World-Check One benefits More precision World-Check One enables greater customisation and control at name-matching level to screen against specific lists and data sets, or specific fields within those data sets, such as gender, nationality and date of birth.Lowering false positives When combined with the configurable name-matching algorithms and filtering technology in World-Check One, multiple secondary identifiers in World-Check help to reduce false positives.Intelligent teamwork The case management tool enables managers to define customised workflow to route cases to the right individuals and specialist teams, thereby reducing cycle times, promoting speed and efficiency, and giving teams more time to focus on investigations of the highest concern.Get more done with less World-Check One is designed to reduce the burden of daily customer screening. Its customisable searches, reduced false positives, ongoing screening capability and improved workflow reduce cycle times.Streamline the screening processOur World-Check One API facilitates the integration oflarge volumes of information and advanced functionalities into existing workflows and internal systems. Thisincreases the operational efficiency of the screeningprocess for onboarding, Know Your Customer (KYC) and third-party risk due diligence.One solution to screen multiple listsWatchlist Screening allows users to upload internaland third-party lists to World-Check One and apply thematching logic to all data sets, ensuring minimisation offalse positives and consistency of results.More precise media screeningNegative media forms part of a best practice approach to customer due diligence and ongoing risk assessment. AI delivers next-generation media screening of unstructured media, along with improved relevancy of results andworkflow integration, to enable better decision-making.Audit trail* and reporting capabilitiesWorld-Check One provides an extensive auditingcapability, with date-stamped actions for the matchresolution process. It includes detailed reports that canbe used as part of management reporting and regulatory proof of due diligence.World-Check One delivers a more efficient approachBalancing the regulatory and operational burden requires organisations to take a more targeted approach towards customer due diligence. Firms often have to do more with less. They require moreefficiency from the tools, technology and operations that support customer due diligence.*Not applicable for clients that do not require an audit trail.World-Check One leveragesWorld-CheckFind hidden risk in business relationships and human networks.World-Check provides trusted information to help businesses comply with regulations and identify potential financial crime. Since its inception, World-Check has served the KYC and third-party screening needs of the world’s largest firms, simplifying day-to-day onboarding and monitoring decisions, and helping businesses comply with anti-money laundering and countering financing of terrorism legislation. World-Check data is sourced from the public domain, deduplicated, structured into individual reports and linked to associations or human networks. Each action is underpinned by a meticulous, regulated research process.In addition to 100 percent sanctions coverage, additional risk-based information is sourced from extensive global media research by more than 400 research analysts working in over 65 languages, covering 240 countries. Information is collated from an extensive network of thousands of reputable sources, including 700+ sanction, watch, regulatory and law enforcement lists, local and international government records, country-specific data sources, international adverse electronic and physical media searches, and English and foreign language data sources.Sophisticated softwareA unified platform approach to customer due diligence.Our highly scalable solution is built for single users or large teams to support a carefully targeted approach to screening during KYC onboarding, ongoing monitoring and rescreening cycles. The system makes remediation quicker and more intelligent, and is adaptable to meet regulation changes.Additional servicesWe help organisations to optimise their resources and reduce operational cost.Screening Resolution Service – Our service highlights positive and possible matches for any customer identification programme detecting heightened risk individuals and entities, screened againstWorld-Check.By using a managed service like Screening Resolution Service, you can reduce your cost of compliance and free up departments to focus their efforts on activities such as tracking and implementing regulatory change. LSEG Due Diligence Reports – Use our Due Diligence reports to help you comply with anti-money laundering, anti-bribery and corruption regulations, or ahead of a merger, acquisition or joint venture. Y ou can also use them for third-party risk assessment, onboarding decision-making and identifying beneficial ownership structures.Using only ethical and non-intrusive research methods, LSEG is committed to principles of integrity and accountability. Subjects are not aware when we carry out an investigation, and we never misrepresent our activities. LSEG has a dedicated risk and control team that performs regular audits of the service, and external accreditation to ISAE 3000 standard through Schellman & Company, LLC.LSEG World-Check One for Salesforce – World-Check One for Salesforce connects your customer and third-party data from Salesforce with our proprietary World-Check to help you decide whether to onboard the vast majority of entities being screened or use further due diligence.Collaboration toolsEnhanced enterprise-level case management capabilities facilitate work on cases with assigned colleagues and teams when investigating risk, to ensure all decisions and discussions are captured as part of your audit trail. Secondary matchingApply secondary matching rules at list level based on your approach. Greater control enables reduced false positives. User experienceProven user interface promotes minimum user interaction.Cross-team communicationLanguage capabilities, ideal for multinational companies and team remediation.Prove due diligenceEach step of the screening process is tracked and saved for auditing purposes. T o satisfy regulatory demands, organisations can retrieve a detailed report showing the decision-making process and the individuals involved during every stage of the remediation process.World-Check One’s easy-to-use interface helps compliance teams work more efficiently.454312LDA3267049/10-23。

单位招聘考试PTN专业(试卷编号161)

单位招聘考试PTN专业(试卷编号161)

单位招聘考试PTN专业(试卷编号161)1.[单选题]R860设备最大支持本地会话的ID为()A)1200B)1800C)1000答案:B解析:2.[单选题]当前SPN网络中,ISIS协议一般使用()层次A)1) LEVEL1B)2) LEVEL2C)3) LEVEL 1/2答案:B解析:3.[单选题]SPE从NPE学到核心网路由后,不再向其他UPE和SPE发布,只向UPE发布一条()A)默认路由B)明细路由C)黑洞路由答案:A解析:4.[单选题]烽火CiTRANS R865设备共有()槽位,其中业务槽位()个A)32/24B)32/26C)30/24D)30/26答案:A解析:5.[单选题]U31服务器对应的SQL Server默认的用户名是A)RootB)ZTEC)adminD)sa答案:D解析::SNMPB)读团体名:fiber-RO读写团体名:fiber-RW安全名:fiberhome组名:onlye访问控制列表名称:SNMPC)用户组名:NMS用户名:fiberhome访问控制列表名:SNMPD)以上说法均不正确答案:C解析:7.[单选题]OAM测试,做的一条百兆业务,测试环回帧功能时,设置完成后,需要在源站的哪个盘上点右键进行“状态监视”A)上话业务的ESJ1盘B)XCUJ1盘C)XSJ1盘D)NMUJ1盘答案:B解析:8.[单选题]对于CES业务,当AC侧需要加载保护时,如果加载的是1+1保护,那么主备AC端口会受到2份完全一样的报文,此时该如何转发?()A)与传统网络一样,同样进行仿真转发,再还原B)对与两份完全一样的报文,在备用AC端口进行丢弃C)对与两份完全一样的报文,在接入侧设备进行选收D)对与两份完全一样的报文,在接入侧设备进行并收,透传给基站答案:B解析:9.[单选题]下面评估内容不属于结构评估的是A)超大环和超长链B)成环率C)超大汇聚节点D)双归保护结构答案:D解析:10.[单选题]PTN640设备在配置1:1保护时,LSP标签值正向与反向( )A)可以相同;B)一定相同;C)一定不同;D)没有要求。

网络安全口语

网络安全口语

网络安全口语随着互联网的飞速发展,网络安全已经成为我们生活中不可忽视的问题。

在日常生活和工作中,我们经常会涉及到网络安全的话题,因此学习一些网络安全口语是非常必要的。

本文将为您介绍一些常用的网络安全口语,帮助您更好地保护个人信息和网络安全。

1. 信息保护 (Information Protection)- Could you please encrypt my files? (请为我的文件加密。

)- Remember to set a strong password for your accounts. (记得为你的账户设置一个强密码。

)- Be cautious when sharing personal information online. (在网上共享个人信息时要小心。

)- Have you enabled two-factor authentication for your email? (你的电子邮件启用了双重认证吗?)- Have you backed up your important files? (你备份了重要文件吗?) - Don't click on suspicious links or download unknown attachments. (不要点击可疑的链接或下载未知附件。

)- It's important to keep your antivirus software up to date. (保持你的防病毒软件更新很重要。

)- Make sure to log out of your accounts when using public computers. (在使用公共计算机时一定要退出你的账户。

)- Avoid using public Wi-Fi for sensitive transactions. (避免在公共Wi-Fi环境下进行敏感交易。

美版paypal风控注意事项

美版paypal风控注意事项

美版paypal风控注意事项随着互联网的发展,我们的支付方式也越来越多样化。

PayPal作为一种国际通用的支付方式,已经成为人们在国际交易中最受欢迎的方法之一。

然而,在使用PayPal的同时,我们也需要了解它的一些风险控制注意事项。

下面就来了解一下美版PayPal风控注意事项。

1.网络安全意识PayPal账户的安全性非常重要,一个账户的安全性取决于用户的个人信息及登录密码是否泄露。

我们需要提高网络安全意识,设置强密码,避免在可疑网站上输入个人信息。

2.账户安全PayPal账户被窃取是用户遭受支付风险的一种常见情况。

为了确保账户安全,请启用两步验证(2FA)和检查有关账户安全的选项,如使用钓鱼邮件报告功能、电话验证等。

如果您是商家,请遵守PayPal 的安全要求并确保您的网站是安全的。

3.交易安全PayPal的交易安全机制包括卖家保护和买家保护,让我们花费更少但依然保证交易安全。

当接收到付款时,卖家应该立即发货并在PayPal界面上标注交付方式和时间,避免与买家产生交易诉讼。

对于买家来说,需要确保对方的主页、评价、历史交易等信息均是真实有效的。

4.系统更新在购物、支付完成后,需要对电脑操作系统和浏览器进行更新和维护。

PayPal的官方网站和客户端在升级器中会通知您升级安全版本,保持官方的支付服务最佳体验。

5.遵循PayPal规定PayPal有严格的使用规定,需要向PayPal输入真实姓名和地址等资料,只有做到合法合规,才能让自己的PayPal账户更加安全。

同时,也需要遵守PayPal服务条款和协议,并在使用支付功能时遵守PayPal 的规定。

总结在使用美版PayPal时,我们需要提高个人的网络安全意识,设置强密码,并且检查并更新电脑系统,尽力确保账户、交易和信息的安全。

此外,需要仔细阅读并遵循PayPal的规定,确保使用方式符合规范。

通过这些措施,我们能更好地保护我们的PayPal账号和交易,让我们的支付过程更加稳定和可靠。

2012datacenter密钥

2012datacenter密钥

2012年,美国国家安全局(NSA)的前雇员爱德华·斯诺登爆料,揭露了美国政府秘密监控计划Prism,其中泄露了一份对被监控数据中心的密钥。

这一事件引发了全球范围内的轰动,也引发了对数据安全和隐私保护的深刻思考。

在这篇文章中,我们将对2012datacenter密钥这一事件进行分析和解读。

一、事件背景1.斯诺登爆料2012年,爱德华·斯诺登向《卫报》和《华盛顿邮报》提供了大量的证据,揭露了美国政府秘密监控计划Prism。

Prism被揭露后,人们发现美国政府通过此计划可以对全球范围内的通讯数据进行监控和窃取。

这一事件引起了全球范围内的关注和愤怒,亦引发了对数据安全和隐私保护的广泛讨论。

二、事件影响1.全球关注2012年,Prism事件成为全球关注的焦点,并引发了关于政府监控行为和个人隐私保护权利的激烈讨论。

人们开始对政府的监控行为提出质疑,并加大了对数据安全和隐私保护的关注程度。

2.数据中心密钥泄露在Prism事件中,斯诺登泄露了一份对被监控数据中心的密钥,这一行为引发了对数据中心安全性的质疑。

数据中心一直被视为各个行业的重要基础设施,而其安全性更是备受重视。

密钥的泄露给数据中心的安全性带来了严重的挑战和危机。

三、事件启示1.数据中心安全性问题Prism事件中密钥的泄露凸显了数据中心的安全性问题。

数据中心的安全性一直备受关注,而此次事件的发生引发了对数据中心安全性的深刻思考。

数据中心在承载着各种重要信息和数据的也面临着来自外部的安全威胁和挑战。

数据中心安全性的加强势在必行。

2.数据隐私保护Prism事件引发了对数据隐私保护的讨论。

人们开始重新审视自己的个人隐私权利,并对政府和企业在数据收集和利用方面的行为进行了持续关注和监督。

数据隐私保护成为了社会的热点话题,也催生了相关法律法规的出台和完善。

四、对策建议1.加强数据中心安全管理对于数据中心来说,加强安全管理是至关重要的。

数据中心需要采取一系列有效的措施,包括加密技术、权限管理、入侵检测等,以保障数据的安全性和完整性。

中美两国影子银行系统比较与建议

中美两国影子银行系统比较与建议
式 与美 国一 样 , 是集 中型监管 投 资 银行 的监 管 盲 区 。二 是 中 银 行 体 系监 管 存 在差 异 。美 国 都
模 式 。 即政 府 制定 专 门的监 管 美 两 国影 子 银 行 跟商 业 银 行 的 影 子银行 体系监管 评述提 出 : 监
法 律 , 设 立 全 国性 的 监 管 机 类 似度不 同 。美 国的投资 银行 、 管 评 述 主 张赋 予 融 资渠 道 狭 窄 并 构 。二是 监 管 机构 设 置 状况 类 对 冲 基金 等 非 银行 金 融 机 构所 银 行特许 专营权 , 门从 事投 资 专 似 。美 国监 管 机构 包 括 美 国 国 发 挥 的融 资 中介作 用 跟 一 般 意 银 行业务 ; 监管评 述提 出通过对 会和证券 交易 委员会 , 日常 监管 义上 的银行极 为类 似 , 只是 监管 融 资 渠道 狭 窄 银行 开 放 中 央银
( ) 一 中美 两 国影 子 银行 体 律来 规范投 资银行 ; 而我 国只有 大 部 分来 自股 票 承销 发 行 以及 系 的共 同点 。一是 监 管 模式 类 《 券法》 证券 投资基金 法》 证 和《 ,
似 。我 国对 投 资银 行 的监 管模 还 需 要 出 台相 关 的法 律 来 填补 美 国投行 。 四是 中美 两 国影子
量 的金融 风险 , 终 引发 全球金 理 办法》 最 。 占 1%左右 , 0 且收 益与金 融衍 生
融 危 机 。本 文 比较 了 中美 两 国
( ) 二 中美 两 国影 子 银 行 体 品有着 紧密的联 系。20 年 , 0 7 只
的影 子银行 体系 , 出了强化我 系 的不 同点 。一是 中美 两 国监 有 高盛 的杠 杆 率 ( 提 总负 债/ 资 净

SentinelOne Singularity安全平台产品说明书

SentinelOne Singularity安全平台产品说明书

SentinelOne Endpoint SecuritySingularity TM Platform Product BundlesGlobal SaaS implementation. Highly available. Choice of locality (US, EU, APAC).Flexible administrative authentication and authorization: SSO, MFA, RBAC Administration customizable to match your organizational structure 365 days threat incident historyIntegrated SentinelOne ThreatIntelligence and MITRE ATT&CKThreat IndicatorsData-driven dashboard securityanalyticsConfigurable notifications by emailand syslogSingularity Marketplace ecosystem ofbite-sized, 1-click appsSingle API with 340+ functionsCore is the bedrock of all SentinelOne endpoint security offerings. It is our entry-level endpoint security product for organizations that want to replace legacy AV or NGAV with an EPP that is more effective and easy to manage. Core also offers basic EDR functions demonstrating the true merging of EPP+EDR capabilities. Threat Intelligence is part of our standard offering and integrated through our AI functions and SentinelOne Cloud. Singularity Core features include:• Built-in Static AI and Behavioral AI analysis prevent anddetect a wide range of attacks in real time before they causedamage. Core protects against known and unknown malware,Trojans, hacking tools, ransomware, memory exploits, scriptmisuse, bad macros, and more.• Sentinels are autonomous which means they apply prevention and detection technology with or without cloud connectivity and will trigger protective responses in real time.• Recovery is fast and gets users back and working in minuteswithout re-imaging and without writing scripts. Any unautho-rized changes that occur during an attack can be reversed with 1-Click Remediation and 1-Click Rollback for Windows.• Secure SaaS management access. Choose from US, EU, APAC localities. Data-driven dashboards, policy management by site and group, incident analysis with MITRE ATT&CK integration,and more.Control is made for organizations seeking the best-of-breed security found in Singularity Core with the addition of “security suite” features for endpoint management. Control includes all Core features plus:• Firewall Control for control of network connectivity to and from devices including location awareness• Device Control for control of USB devices and Bluetooth/BLEperipherals• Rogue visibility to uncover devices on the network that needSentinel agent protection• Vulnerability Management, in addition to ApplicationInventory, for insight into 3rd party apps that have knownvulnerabilities mapped to the MITRE CVE databaseSingularity Platform Features & Offerings All SentinelOne customers have access to these SaaS management console features:Complete is made for enterprises that need modern endpoint protec-tion and control plus advanced EDR features that we call ActiveEDR®. Complete also has patented Storyline™ tech that automatically contex-tualizes all OS process relationships [even across reboots] every second of every day and stores them for your future investigations. Storyline™ saves analysts from tedious event correlation tasks and gets them to the root cause fast. Singularity Complete is designed to lighten the load on security administrators, SOC analysts, threat hunters, and incident responders by automatically correlating telemetry and mapping it into the MITRE ATT&CK® framework. The most discerning global enterpris-es run Singularity Complete for their unyielding cybersecurity demands. Complete includes all Core and Control features plus:• Patented Storyline™ for fast RCA and easy pivots• Integrated ActiveEDR® visibility to both benignand malicious data•D ata retention options to suit every need,from 14 to 365+ days• Hunt by MITRE ATT&CK ® Technique• Mark benign Storylines as threats for enforcement bythe EPP functions•C ustom detections and automated hunting rules withStoryline Active Response (STAR™)•T imelines, remote shell, file fetch, sandbox integrations,and moreVigilance MDR Services SubscriptionSentinelOne Vigilance Managed Detection & Response (MDR) is a ser-vice subscription designed to augment customer security organizations. Vigilance MDR adds value by ensuring that every threat is reviewed, acted upon, documented, and escalated as needed. In most cases we interpret and resolve threats in about 20 minutes and only contact you for urgent matters. Vigilance MDR empowers customers to focus only on the incidents that matter making it the perfect endpoint add-on solution for overstretched IT/SOC Teams.More info:/global-services/services-overview/SentinelOne Readiness Services SubscriptionSentinelOne Readiness is an advisory subscription service designed to guide your Team before, during, and after product installation with a structured methodology that gets you up and running fast and keeps your installation healthy over time. Readiness customers are guided through deployment best practices, provided periodic agent upgrade assistance, and receive quarterly ONEscore TM health check-ups to en-sure your SentinelOne estate is optimized.More info:/global-services/readiness/Impressive capabilities. Easy to deployand use EDR.Director of Cybersecurity - Heathcare1B - 3B USD“Single platform the SOC can rely on.Security & Risk Management - Finance50M - 250M USD“Increased efficiency. We’ve absolutelyseen an ROI.Global InfoSec Director - Manufacturing10B - 25B USD“Global Support & Service OfferingsSentinelOne Readiness Deployment & Ongoing Health SubscriptionAvailableGLOBAL DA T A CENTERS US, Frankfurt, T okyo, A WS GovCloud Highly AvailableSENTINELONE LOCA TIONS Mountain View, CA (HQ) T el Aviv , Boston, Amsterdam, T okyo, Oregon USInnovative. Trusted. Recognized.Record Breaking ATT&CK Evaluation • No missed detections. 100% visibility • Most Analytic Detections 2 years running • Zero Delays. Zero Config ChangesA Leader in the 2021 Magic Quadrant for Endpoint Protection Platforms Highest Ranked in all Critical Capabilities Report Use Cases4.998% of Gartner Peer Insights TM Voice of the Customer Reviewers recommend SentinelOneAbout SentinelOne。

网络越境使用指南:畅游全球互联网(八)

网络越境使用指南:畅游全球互联网(八)

网络越境使用指南:畅游全球互联网网络的发展为我们提供了一个广阔的信息交流平台,让我们能够随时随地获取各种知识和享受各种娱乐。

然而,由于地理位置和政策的限制,我们有时无法正常访问全球互联网上的资源。

本文将为大家提供一些网络越境使用的指南,帮助大家畅游全球互联网。

一、选择适合的VPN工具VPN(虚拟专用网络)是一种可以建立安全连接的技术,可以让用户通过一个中继服务器访问Internet,并将用户的真实IP地址隐藏起来。

选择适合的VPN工具是网络越境使用的基础。

目前市面上有很多不同的VPN服务提供商,用户可以根据自己的需求选择。

在选择时,需要考虑以下几个因素:1. 服务器数量和分布:服务器数量越多、分布越广,越能提供更好的访问体验。

2. 速度和稳定性:网络连接速度较快且稳定的VPN服务,可以保证流畅的上网体验。

3. 隐私政策:选择有严格隐私政策的VPN,以保护个人信息安全。

4. 价格:不同VPN服务提供商的价格各异,用户可以根据自己的财力状况选择适合的服务。

在选择VPN工具时,还需要关注该服务是否符合自己所在地区的法律法规,以免违反相关规定。

二、访问全球内容使用VPN工具可以让我们绕过地理限制,访问全球范围的互联网资源。

以下是一些建议,帮助大家畅游全球互联网:1. 海外视频娱乐:有些视频网站和流媒体平台的内容在特定地区是无法访问的。

通过选择合适的VPN服务器,我们可以突破地域限制,畅享全球的视频娱乐资源。

2. 获取全球资讯:不同地区有不同的新闻报道和资讯资源。

通过使用VPN,我们可以访问境外的新闻网站和社交媒体,了解更多全球范围内的动态和信息。

3. 跨境购物和电商:有时我们会想购买海外特色产品或者通过跨境电商平台购物。

通过选择适合的VPN服务器,我们可以访问到特定地区的电商网站,享受全球购物的便利。

4. 跨国工作和学习:对于一些需要跨国交流的工作或学习任务,使用VPN可以轻松地访问到国外的网站和资源,提高工作和学习效率。

美国棱镜计划窃听范围

美国棱镜计划窃听范围

美国棱镜计划窃听范围简介美国棱镜计划(PRISM)是美国国家安全局(NSA)秘密实施的一个大规模网络监控项目,在2013年被前美国国家安全局承包商爱德华·斯诺登曝光后引发了广泛争议。

这个计划的目的是监控全球互联网上的通信数据和信息,以获取情报和防范恐怖主义活动。

然而,PRISM计划的大范围窃听行为引发了隐私权和个人权利方面的强烈担忧和争议。

PRISM计划的窃听范围根据斯诺登的披露,PRISM计划窃听的范围非常广泛,涉及全球各个国家的互联网通信,并从多家知名科技公司获取大量用户的通信数据和个人信息。

以下是PRISM计划窃听的主要对象和范围:1. 社交媒体和通信平台PRISM计划窃听了包括Facebook、Twitter、YouTube、Skype、Google、Microsoft等在内的多家知名社交媒体和通信平台。

这些平台每天都产生大量的用户数据和通信记录,包括个人资料、联系人、聊天记录、视频和音频通话等等。

2. 电子邮件服务提供商PRISM计划窃听了包括Gml、Hotml、Yahoo Ml等在内的多家电子邮件服务提供商。

这些邮件服务商每天都处理大量的电子邮件,包括个人邮件、商业邮件、政府机构邮件等等。

通过窃听这些邮件服务商,PRISM计划获取了大量的电子邮件内容和附件。

3. 云存储服务提供商PRISM计划窃听了包括Dropbox、Microsoft OneDrive等在内的多家云存储服务提供商。

这些云存储服务商为用户提供了便捷的数据存储和共享服务,用户可以将各种类型的文件上传到云端进行存储和分享。

通过窃听这些云存储服务商,PRISM计划可以获取存储在云端的文件内容和元数据。

4. 通信运营商PRISM计划窃听了包括AT&T、Verizon等在内的多家通信运营商。

通信运营商每天都处理大量的电话通话、短信和数据流量。

通过窃听这些通信运营商,PRISM计划可以获取用户的通信记录、通话内容以及位置信息等。

shadowsocsr使用方法

shadowsocsr使用方法

shadowsocsr使用方法摘要:1.阴影社会软件(ShadowSOC)简介2.阴影社会软件(ShadowSOC)安装与配置3.阴影社会软件(ShadowSOC)功能与应用4.阴影社会软件(ShadowSOC)实战案例5.阴影社会软件(ShadowSOC)使用注意事项6.阴影社会软件(ShadowSOC)与其他软件的比较7.总结与展望正文:一、阴影社会软件(ShadowSOC)简介阴影社会软件(ShadowSOC)是一款功能强大的网络安全测试工具,主要用于渗透测试、网络取证、安全研究等领域。

它具有轻量级、易用性强、兼容性好等特点,受到了众多网络安全爱好者和专业人士的喜爱。

二、阴影社会软件(ShadowSOC)安装与配置1.操作系统要求:ShadowSOC支持Windows、Linux和MacOS等操作系统。

2.安装步骤:a.下载ShadowSOC 安装包。

b.解压安装包。

c.进入解压后的文件夹,运行“Setup.exe”进行安装。

d.安装完成后,启动ShadowSOC,按照提示进行简单配置。

3.配置方法:a.修改配置文件:在安装目录下找到“config.json”文件,根据需要进行修改。

b.设置代理:在“config.json”文件中设置代理服务器,以实现网络数据的转发。

c.修改端口号:在“config.json”文件中设置端口号,以便与其他设备进行通信。

三、阴影社会软件(ShadowSOC)功能与应用1.渗透测试:ShadowSOC 提供了多种渗透测试功能,如SQL 注入、XSS 跨站脚本攻击、文件包含等。

2.网络取证:通过ShadowSOC 可以获取目标主机上的敏感信息,如用户名、密码、文件等。

3.信息收集:ShadowSOC 支持扫描目标主机上的开放端口、服务、操作系统等信息。

4.代理转发:使用ShadowSOC 可以实现网络数据的代理转发,便于进行隐蔽通信。

5.反制措施:ShadowSOC 可以帮助检测和防范针对性的攻击,提高网络安全性。

UCMDB自监控通用CMDB November 2017白皮书说明书

UCMDB自监控通用CMDB November 2017白皮书说明书

White PaperUCMDBSelf-MonitoringUniversal CMDBNovember 2017White Paper UCMDB Self-Monitoring ContentsOverview (3)UCMDB Server (3)UCMDB Database (8)Universal Discovery (8)Store and Forward Server (11)2OverviewThis document lists items that you can monitor in order to understand whether UCMDB is working correctly and to help flag any anomalies that warrant further investigation.UCMDB Server•Monitor the UCMDB Server serviceo Windows: Monitor the UCMDB_Server service to make sure that it is running.o Linux: Search for the UCMDBServer process (the path to the process will resembleopt/hp/UCMDBServer/bin/wrapper).▪Monitor wrapper.exe. This is a "watchdog" process that monitors the UCMDB_Server process.▪Wrapper logs for UCMDB Server are saved tohp\UCMDB\UCMDBServer\runtime\log\wrapper.log.▪Log entries for starting UCMDB resemble the following:STATUS | wrapper | 2014/07/30 10:47:51.692 | Launching a JVM...INFO | jvm 1 | 2014/07/30 10:47:52.896 | -XX:+CMSClassUnloadingEnabled -XX:+CMSIncrementalMode -XX:+HeapDumpOnOutOfMemoryError -XX:InitialHeapSize=1073741824 -XX:+ManagementServer -XX:MaxGCPauseMillis=250 -XX:MaxHeapSize=4294967296 -XX:MaxNewSize=1073741824 -XX:MaxPermSize=201326592 -XX:MaxTenuringThreshold=6 -XX:OldPLABSize=16 -XX:-OmitStackTraceInFastThrow -XX:+PrintCommandLineFlags -XX:+PrintGC -XX:+PrintGCDetails -XX:+UseAdaptiveGCBoundary -XX:+UseCompressedOops -XX:+UseConcMarkSweepGC -XX:-UseLargePagesIndividualAllocation -XX:+UseParNewGCINFO | wrapper | 2014/07/30 10:48:06.658 | Waiting to start...INFO | jvm 1 | 2014/07/30 10:48:09.629 | WrapperManager: Initializing...INFO | jvm 1 | 2014/07/30 10:48:11.351 | 2014-07-30 10:48:11,336[WrapperSimpleAppMain] INFO - Starting cmdb serverSTATUS | wrapper | 2014/07/30 10:48:13.668 | UCMDB_Server started.▪Log entries for stopping UCMDB resemble the following:STATUS | wrapper | 2014/07/25 20:53:30.517 | on_exit triggermatched. Restarting the JVM. (Exit code: 1)INFO | wrapper | 2014/07/30 10:12:13.870 | Waiting to stop...STATUS | wrapper | 2014/07/30 10:12:17.473 | <-- Wrapper StoppedSTATUS | wrapper | 2014/07/30 10:12:18.876 | UCMDB_Server stopped.•Check the status of UCMDB Server. To do this, open <protocol>://<serverName>:<port>/status in a browser (access requires authentication). Possible statuses are Up, Starting, and Down.•If the UCMDB UI is not accessible, check that the status of the UI server is UP. To do this, open <protocol>://<serverName>:<port>/ucmdb-ui/status.jsp in a browser.•Monitor the amount of free space that is available on the server. The server creates files and uses disk space in the directory tree in which the server is installed (by default, hp\UCMDB\ UCMDBServer). If SOLR is enabled but a standalone SOLR approach is not used, full-text search indexes (UCMDBServer\search\) can occupy a significant amount of disk space and grow in proportion to the data model size. Check the Universal CMDB Support Matrix document for more information about free space.•Check that the UCMDB log levels are set to the default value.o Log levels in UCMDB are configured by changing the log settings in the \conf\logs directory in the UCMDB installation folder.o A more detailed log level (such as DEBUG) can impact UCMDB performance, as every action performed by the application is slowed down by disc I/O as the logs are written to the physical disk. Ingeneral, no logs should ever be set to the DEBUG level unless you are troubleshooting a specific issue. •If you experience slow performance, check the slow.log files.o Each operation that takes more than a certain time (by default, 5 seconds; configurable in operation.slow.log.threshold) is written to the log.o Each operation that exceeds a defined timeout (configurable in server.sync.session.timeout) is written to the log.o The log is written to every 60 seconds.o The log includes thread names and commulative time (how long the operation has taken currently) o The log includes all managers, their status, and their queue (Manager name (max threads), Busy=threads; Waiting=threads). If a manager has any threads that are in the Waiting state for morethan 10 minutes, UCMDB may experience a performance degradation. If there are more than 100serving threads, UCMDB Server may run slowly.o Check for operations that have an elapsed time greater than 10 minutes.o We recommend that you increase the number of slow.log log files to 100. This ensures that the logs capture a longer timeframe for analysis. Make sure that enough free disk space is available.o Historical and "Top 10 worst" operations are saved to \runtime\log\statistics.▪These logs are written to every 15 minutes.▪The logs record the operations executed, the different types of operation executed, the average time of operations, and the 10 worst operations.▪The logs record all operations during the last 15 minutes, together with the average and maximum duration, and the number of operations. You should investigate operations that take more than 10minutes.▪Ignore AutoDiscoveryOperationGetProbeTasks 30 seconds. This is the default operation timeout.NoteIt is normal for some operations to take a long time. For example, merging a lot of data, performing ahistory baseline, or purging data may take 20 to 30 minutes. However, this should occur only rarely; if it occurs regularly, you should investigate further.•Check UI statistics by invoking the getServicesStatisticsSortByAvgDuration JMX method.o If UCMDB users experience slow UI navigation or login, this JMX method can highlight potential slow areas.o Investigate any operations that take more than 60 seconds.•Check the thread count and memory usage in the jvm_statistics.log file.o Check that enough memory is assigned to the UCMDB server, based on the deployment type as recommended in the Universal CMDB Support Matrix document.INFO - HEAP - [USAGE: 3989.8, FREE: 3.9, TOTAL: 3993.6, MAX: 3993.6]; NON-HEAP -[USAGE: 181.6, FREE: 50.9, MAX: 240.0]; CLASSES - [Loaded: 26658, Unloaded: 1651,Left: 25007]; THREADS - [Count: 259]•Check the cmdb.dal.log file (cmdb.dal.slow) to identify queries that take more than 150 seconds.2017-07-18 12:47:32,226 [RequestProcessorAsyncPool-19858] 483705ms 863448635 755639820 1193357250 309891880 704983185 1216509861 SELECT CDM_ROOT_1.CMDB_ID FROM CDM_ROOT_1CDM_ROOT_1 …..•Check the output from the runSupportHandlersForAllCategories JMX method. This method generates a lot of useful statistics about UCMDB Server.o For more information about this JMX method, refer to the "How to Access Support Using the JMX Console" section in the Universal CMDB Administration Guide.•Check the number of active enrichments, TQLs, and pattern-based models.o This data can be found in the .zip file that is generated by using the Supportability Services JMX methods.o You can also use the retrieveTqlNames and retrieveAllEnrichmentNames JMX methods.•Use the System Health Services JMX method to check the active TQL count.o It is important to check the number of active TQLs. We recommend that you have a maintenance task to delete unused and test active TQLs and deactivate those that do not need to be active.o You can also view this information by running the retrieveTqlNames JMX method or by checking the runSupportHandlersForSpecificCategories output (TQL.properties file).•Check the cmdb.pattern.statistics.log log file, which displays TQLs and Views, together with statistics about how long each one took took, the average time, the maximum time, and the result size.o This log shows data for active TQLs only.o To check all UCMDB TQLs that are calculated, check the cmdb.tql.calculation.audit.log log file.Check for TQLs that take more than 600 seconds.Finished calculation of pattern [JDBCDataSrc_Database]:[JDBCDataSrc_Database Num of nodes [2] ; -10 - database ; -11 - jdbcdatasourceNum of links [1] ; -12(-11 --> -10) - join_f] Result size [12000] calculationtime = [JDBCDataSrc_Database= 920.016 ]Finished calculation of pattern [Probe Info]: [Probe Info Num of nodes [1] ; 1- discoveryprobegateway Num of links [0]] Result size [1] calculationtime = [Probe Info= 1.230 ]•Check the active TQL status. To do this, run the showFullReport JMX method.•Check the CPU usage for the UCMDB process.o In Linux environments, this is logged in the os_statistics.log file.USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMANDroot 29472 5.0 63.3 8621540 5071408 ? Sl 00:32 30:43/opt/hp/UCMDB/UCMDBServer/bin/jre/bin/ucmdb_server –servero In Windows environments, use Task Manager or other monitoring tools. This information is not stored in the UCMDB logs.•Check for model consistency using the newDbTool database tool. This is documented in the Universal CMDB Administration Guide.o Alternatively, you can run the use findBrokenLinks, deleteBrokenLinks, andcheckModelConsistency JMX methods.o The recommended approach is to use the newDbTool.bat tool (not in preview mode) to clean any inconsistent CIs.•You can check what UCMDB is doing at a specific time by invoking the following JMX methods. The JMX methods reveal which managers are running, together with a full stack trace. This enables you to see which UCMDB operations are running, and their callers.o viewOperationsInformationo viewFormattedServerSnapshoto viewServerSnapshoto viewThreadDumpo viewLocksInfo•Check the cmdb.reconciliation.audit.log file for the total time of discovery bulks.INFO - [ID=1612311824] [Customer ID=1] [Changer=UCMDBDiscovery: MZ_Basic node_Host Connection by WMI] [total time=120.625o The cmdb.reconciliation.audit.log file contains information to help you troubleshoot potential slow data-in issues.•Check the data-in throughput by using the following JMX methods (aging and automatic probe deletion is not included in these statistics):o viewDiscoveryProcessingStatisticso exportDiscoveryProcessingStatisticsToExcelFor more information about the meaning of the data saved in the Excel file, refer to the "Reconciliation" of the "Supportability Handlers" topic in the Administration guide.UCMDB Database•Check that the UCMDB Database is configured based on the recommendations in the Database guide.•Check if there are any UCMDB Database connection from JMX by using the viewDbConnectionSummary JMX method.o There should be no connections. Database connection leaks are displayed for many hours, until the server restarts.•Check if there are any inconsistencies between the UCMDB class model and the database tables by using the rebuildModelDBSchemaAndViews JMX method.o If inconsistencies exist, run the rebuildModelDBSchemaAndViews and rebuildModelViews JMX method.o The class model must be aligned with the Database tables and views.•Check if there are any missing indexes. To do this, run the showAndRebuildMissingIndexes JMX method.o One of the common root causes for a slow environment is index fragmentation.o Check the Universal CMDB Database Guide for details about how to monitor index fragmentation and how to create an index rebuild plan based on the discovery schedule and load of the UCMDB server.•Check the UCMDB connection to the Database by using the testConnectionToDB JMX method. The method displays a basic summary of few DB SQL statements.o Use the method to establish a baseline. Run the method when the system is busy and when it is idle.This can highlight possible UCMDB database configuration issues.•Fix any history tables inconsistencies by using the alignHistoryForType JMX method.o If there are inconsistencies in the history tables (for example, missing columns) data in operations will fail.•Delete any unused history tables from the Database to save disk space on the Database server. To do this, run the deleteUnboundHistoryTables JMX method.Universal Discovery•Monitor the following Windows services on the Data Flow Probe server to make sure the services are running:•"UCMDB_Probe_XmlEnricher" (Display name: "HP Universal Discovery XML Enricher")•"UCMDB_Probe" (Display name: "UCMDB Probe")•"UCMDB_Probe_DB" (Display name: "UCMDB_Probe_DB")•It is necessary to monitor the amount of free space available on the probe. The probe creates files and uses disk space in the directory tree in which the probe is installed (by default, C:\hp\UCMDB\DataFlowProbe).Scan files (especially if software scanning is enabled) can occupy a significant amount of disk space. If the free disk space is less than 100 Mb, you should free more space.•When you encounter problems, refer to the log files (by default, these are located inC:\hp\UCMDB\DataFlowProbe\runtime\log). Logs that typically contain information about fatal errors are WrapperProbeGw.log and probe-error.log. If a log contains an entry that resembles the following example, you must address the issue:<2017-08-23 10:13:12,594> 50626250 [FATAL ] XXXXXXXX•Monitor the probe status using the MAM:service=Discovery manager::monitorDiscoveryProbes UCMDB server JMX method. The method displays information that resembles the following:RUBMYDGLNOMonitors Discovery ProbeLast Report Time: No reports yetReported 0 CIsLast Access Time: 08/24/2017 13:55:30Monitor the Last Access Time value. If the last access time is not updated for one minute, the probe is disconnected.•Run the JobsInformation>viewJobsStatuses probe JMX method.o This JMX method displays the number of stuck triggers in the probe.o When the number of stuck threads reaches 8, the probe will restart.o Monitor this JMX method to be alerted about probe restarts.•Run the GwTaskResultDistributer Probe JMX method.o Check "NumberOfUnsentResults". This is the number of pending bulks waiting in the probe to be sent to the server.o Drill down to the GwTaskResultDistributer >viewUnsentResults JMX method:▪Check how long each bulk is waiting in the probe queue before it is sent to server.▪Bulks may wait too long in the probe queue because of a server-side problem.If the number of unsent results is increasing and is more than 1 million, you should investigate further. •Monitor the probe JVM heap by checking the jvm_statistics.log file (located in\HP\UCMDB\DataFlowProbe\runtime\log). The log contains content that resembles the following:<2017-07-12 12:58:58,660> [DEBUG] [Timer-1] (JVMMonitorInfo.java:13) - HEAP - [USAGE: 241.5, FREE: 253.5, TOTAL: 494.9, MAX: 1979.8]; NON-HEAP - [USAGE: 41.7, FREE: 0.9,TOTAL: 42.6, MAX: 1024.0]; CLASSES - [Loaded: 7093, Unloaded: 0, Left: 7093]; THREADS - [Count: 89]If the free size of HEAP is less than 10, increase the amount of memory allocated to the probe’s JVM. •Check the probeGW-taskResults.log file:o Example:<2014-07-24 12:08:37,925> 145673 [INFO ] (TaskResultsSenderThread.java:166) - Process Result Time Statistics - Total Time:5651, Results size:6, Time To get Tasks:9, Timeto send results: 78, Time until server gets the results:90132, Time to get resultsstatus:5016, Time to process Id Mapping:98, Time to update warnings:0, Time toactivate automatic deletion:378, Time to inform the sent results is:4, Time to finish deleting results:25, Total time to handle Successful results:505o The above entry is printed for each group of discovery results bulks. Each entry includes the following measurements:▪"Time until server gets the results": Select results from DB (in probe side)▪"Time to get results status": Server side work - reconciliation\model update▪"total time to handle Successful results": Update probe DB table•Check the result processing queue time on the server side in the mam.autodiscovery.results.stat.log log file (located in \HP\UCMDB\UCMDBServer\runtime\log).2017-07-12 16:47:12,046 INFO [Process Results Thread-Test Import Vector From File] - Processing result of 'Unix-Daily' from probe: 'USPMVAPP557' took 3948msec. Waiting time (in result processing queue): 133349If the waiting time is more than 120000, you should investigate further.•Check the queue size in the mam.autodiscover.log log file (located in\HP\UCMDB\UCMDBServer\runtime\log).2017-08-22 20:20:25,275 INFO [notification_publish_task0-130] - [DISPATCH] Adding dispatch task to queue. New queue size: 846. Task: Redispatch Trigger Cis•Enable the probe server Database performance log. To do this, follow these steps:1. Open the \HP\UCMDB\UCMDBServer\conf\log\mam.properties file, and then add the followingcode:########################################## DB.performance.appender #########################################log4j.category.mam.collectors.dal=DEBUG,db.performance.appenderlog4j.appender.db.performance.appender=com.mercury.topaz.cmdb.shared.base.log.BetterRollingFileAppenderlog4j.appender.db.performance.appender.File=${logs.dir}/db.performance.loglog4j.appender.db.performance.appender.MaxFileSize=${def.file.max.size}log4j.appender.db.performance.appender.MaxBackupIndex=${def.files.backup.count}yout=org.apache.log4j.PatternLayoutyout.ConversionPattern=%d %-5p - %m%n2. Locate the db.performance.log file (located in \HP\UCMDB\UCMDBServer\runtime\log).2017-08-02 15:35:48,031 DEBUG -context=dalcollectors;operation=setCIs;duration=500349The unit of duration is milliseconds. If one operation exceeds 2 mins, investigate further.Store and Forward Server•Windows:o Monitor the following two Windows services to make sure the services are running:▪"hpudStoreAndForward" (Display name: "HP Universal Discovery Store and Forward Server")▪"hpudApacheSF" (Display name: "HP Universal Discovery Store and Forward Web Server") •Linux:o Monitor the following Store and Forward server processes to make sure they are still running: ▪storeNforward▪httpd (embedded Apache web server daemon)•The Store and Forward server also serves the XML status document showing the current status of the server over HTTP (or HTTPS depending on how the server is configured). The status is available at the following URL:http[s]://<StoreAndForwardServer>:<port>/server_status.xmlIf you view the server status in a browser, a user-friendly HTML page is displayed. However, monitoring software can read the XML itself. For example:<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="server_status.xsl"?><StoreAndForwardStatus version="1.0"><statusDirBytes>0</statusDirBytes><incomingDirBytes>0</incomingDirBytes><inProgressDirBytes>0</inProgressDirBytes><resumeDirBytes>0</resumeDirBytes><freeDiskSpaceBytes>50882215936</freeDiskSpaceBytes><numIncomingFiles>0</numIncomingFiles><numInProgressFiles>0</numInProgressFiles>11<numResumeFiles>0</numResumeFiles><modifiedTime>06/22/14 08:23:30</modifiedTime></StoreAndForwardStatus>•It is important to monitor the amount of free disk space available on the disk that the store and forward server uses for its data. If there are network connectivity problems and the store and forward server is not able to send the files on a timely basis, the files will start to accumulate and consume disk space. The directories that are used for storage are configured in the config.ini file used by the store and forward server:[BaseDirectories]dataDir=xxxincomingDir=yyyMore details can be found in the UCMDB documentation.12White PaperMicro Focus Trademark InformationMICRO FOCUS and the Micro Focus logo, among others, are trademarks or registered trademarks of Micro Focus (IP) Limited or its subsidiaries in the United Kingdom, United States and other countries. All other marks are the property of their respective owners.Company DetailsCompany name: Micro Focus International plcPlace of registration: England and WalesRegistered number: 5134647Registered address: The Lawn, 22-30 Old Bath Road, Berkshire, RG14 1Q。

LED显示屏调试软件NovaLCT同步系统用户指南英文版

LED显示屏调试软件NovaLCT同步系统用户指南英文版

NovaLCTLED Configuration Tool for Synchronous SystemUser GuideProduct Version: V5.1.0XI 'AN NOVA S T AR T EC HC O .,L T D .Copyright © 2018 Xi’an NovaStar Tech Co., Ltd. All Rights Reserved.No part of this document may be copied, reproduced, extracted or transmitted in any form or by any means without the prior written consent of Xi’an NovaStar Tech Co., Ltd.Trademarkis a trademark of Xi’an NovaStar Tech Co., Ltd.StatementYou are welcome to use the product of Xi’an NovaStar Tech Co., Ltd. (hereinafter referred to as NovaStar). This document is intended to help you understand and use the product. For accuracy and reliability, NovaStar may make improvements and/or changes to this document at any time and without notice. If you experience any problems in use or have any suggestions, please contact us via contact info given in document. We will do our best to solve any issues, as well as evaluate and implement any suggestions.X I'A NN OV AS TA RT EC HC O.,LT D.Table of ContentsTable of Contents ............................................................................................................... i i 1 System Overview ............................................................................................................ 1 2 Software Installation ....................................................................................................... 3 3 Terminal Connection (4)3.1 Advanced User Login................................................................................................................................... 4 3.2 Demonstration Login.................................................................................................................................... 4 3.3 Changing Password. (5)4 Function Overview .......................................................................................................... 6 5 Main Functions of NovaLCT (9)5.1 Screen Configuration ................................................................................................................................... 9 5.1.1 Screen Configuration Using System Configuration Files ......................................................................... 9 5.1.2 Smart Screen Configuration ................................................................................................................... 10 5.1.3 Screen Connection ................................................................................................................................. 16 5.1.4 Set Cabinet Information .......................................................................................................................... 20 5.1.5 Adjust the Performance Parameters....................................................................................................... 22 5.1.6 Adjust Resolution and Refresh Rate....................................................................................................... 30 5.1.7 3D Function ............................................................................................................................................ 32 5.1.8 Working Mode Settings........................................................................................................................... 34 5.1.9 Low Latency Settings ............................................................................................................................. 34 5.1.10 Redundancy Settings ........................................................................................................................... 35 5.1.11 Inputs Settings ...................................................................................................................................... 36 5.1.12 Source Settings .................................................................................................................................... 36 5.1.13 Save Settings to Flash .......................................................................................................................... 37 5.1.14 Save/Load Configuration Files ............................................................................................................. 37 5.2 Adjust Brightness ....................................................................................................................................... 39 5.2.1 Manual Adjustment ................................................................................................................................. 40 5.2.2 Automatic Adjustment ............................................................................................................................. 42 5.3 Multi-function Card Management .............................................................................................................. 45 5.3.1 Multi-function Card Configuration ........................................................................................................... 46 5.3.2 Power Management................................................................................................................................ 47 5.3.3 Monitor Data ........................................................................................................................................... 50 5.3.4 External Device (50)XI 'AN NOVA S T AR T EC HCO .,L T D.5.3.5 Load Program ......................................................................................................................................... 51 5.3.6 Audio Management ................................................................................................................................. 53 5.4 Manage the LED Displays ......................................................................................................................... 53 5.5 Check Hardware Information ..................................................................................................................... 54 5.6 Prestore Screen ......................................................................................................................................... 55 5.7 Advanced Color Configuration ................................................................................................................... 56 5.8 Adjust Screen Effect .................................................................................................................................. 58 5.9 Brightness and Color Calibration ............................................................................................................... 59 5.9.1 Online Calibration ................................................................................................................................... 59 5.9.2 Coefficients Management ....................................................................................................................... 61 5.9.3 Double Calibration Coefficients .............................................................................................................. 79 5.10 Screen Control ......................................................................................................................................... 80 5.11 Hardware Monitoring ................................................................................................................................ 81 5.11.1 Refresh Period ...................................................................................................................................... 82 5.11.2 Hardware Configuration ........................................................................................................................ 83 5.11.3 Alarm Configuration .............................................................................................................................. 85 5.11.4 Control Configuration ............................................................................................................................ 86 5.11.5 Email Setting ......................................................................................................................................... 87 5.11.6 Email Log .............................................................................................................................................. 87 5.12 Led Error Detection. (88)6 Cloud Monitoring .......................................................................................................... 92 7 Memory on Module Manage ......................................................................................... 93 8 Receiving Card Relay ................................................................................................... 97 9 Configuration Information Management ..................................................................... 99 10 Multi-Batch Adjustment .. (100)10.1 Manual Adjustment ................................................................................................................................ 100 10.2 Applications Adjustment File (108)11 Loading Configuration File ...................................................................................... 110 12 Dark or Bright Lines Adjustment for Cabinets . (115)12.1 Quickly Adjust Dark or Bright Lines ........................................................................................................ 115 12.2 Dark or Bright Lines Recovery for Cabinet .. (120)13 Video Control ............................................................................................................ 122 14 Module ID Settings .................................................................................................... 126 15 Hardware Program Update ....................................................................................... 128 16 Troubleshooting .. (131)16.1 NovaLCT shows "No Hardware" on corresponding pages .................................................................... 131 16.2 NovaLCT shows "No Screen" on corresponding pages (131)XI 'AN NOVA S T AR T EC HCO .,L T D.16.3 The LED display does not show the image correctly during the Smart Setting procedure (131)16.4 Only a part of the modules of each cabinet work normally in Smart Setting (131)16.5 Permission Error (132)16.6 Failed to install previous versions (135)X I'A NN OV AS TA RT EC HC O.,LT D.1System OverviewNovaLCTNovaLCT is the screen configuration tool operating on Windows. Working with receiving cards, monitoring cards and multi-function cards in the applications ofsynchronous system, NovaLCT allows smart settings, brightness adjustment, power supply control, LED error detection, hardware monitoring for LED displays. Users can easily control the key information of their LED displays with a computer and make the display always perfect.Synchronous systemNovaStar's asynchronous system employs advanced technologies and can be widely used in LED displays.● High gray scale and high refresh rate: universal chip, with high grey scale, high refresh rate and high performance.● Point-by-point chroma correction: correct color of every lamp, eliminate chroma difference among batches of LEDs.●Comprehensive status monitoring: supervising work status, temperature, humidity, smog, supply voltage of switch, fan rotating speed and single lamp open and short circuit of every cabinet.● Infinite area load: unique cascade and synchronization technology, and huge stable and reliable load without black out, jitter or stutter.● Perfect anomalous type support: arbitrary cabling, arbitrary point extraction,arbitrary point insertion, anomalous plate, anomalous cabinet, anomalous screen and easy load.● Low grey scale with richness and smoothness: first-class build-up of luminance, and grey scale of 16-bit, which makes the image of the screen fine and smooth; ● Green, energy saving, and environmental protection: low voltage, low power consumption, low radiation, and easily passing EMI/EMC.●Overall chip supported: support TI, Toshiba, MBI, SITI, ENE, MY , Ri yue cheng, Microblock and other series of products, and supportTLC59282, TLC5929, TLC5944, DM13A, DM13H, P2510, SUM2016, SUM2017,MBI5020/5024/5034/5035/5042/5050/5152, SUM2032, MY9221/9262, RT5924, 16158, 5122, 5929, 5266, 5166and other IC.●No sending card mode supported, being fit for small screen control.XI 'AN N OVA S T AR T EC HCO .,L T D.The system is under two situations: with sending card or no sending card; when it has no sending card, the computer is directly connected with the receiving card through the Ethernet cable.Figure 1-1 Diagram of system architectureFigure 1-2 Diagram of system architecture with no Sending cardX I'A NN OV AS TA RT EC HC O.,LT D.Synchronous System User Guide 2 Software Installation2 Software InstallationPreconditions●Have prepared a PC with Windows system installed.●Have obtained the installation package "NovaLCT V5.1.0.zip" from NovaStarofficial website www.novastar.tech.●Have disabled antivirus software.InstallationFirstly please unzip the installation package "NovaLCT V5.1.0.zip", then double-click"NovaLCT V5.1.0.exe" and follow the installation wizard to complete the softwareinstallation. If the firewall prompt appears, please select to allow the installation.X I'A NN OV AS TA RT EC HC O.,LT D.3Terminal Connection3.1 Advanced User LoginAsynchronous users need to log in to NovaLCT as advanced users to configure screens as required.Step 1 Open NovaLCT and choose User > Advanced Synchronous System User Login . Step 2 Enter the password for logging in the terminal, and click Login .The default password is "admin ". If the login is successful, the interface below will appear, as shown in Figure 3-1.Figure 3-1 Successful login interface3.2 Demonstration LoginNovaLCT allows users to log in, operate and learn about the functions in demonstration mode without connecting hardware devices.Step 1 Open NovaLCT and choose User > Demonstration Login . Step 2 Enter the login password and click Login .The default password is "admin ".XI 'AN N OVA S T AR T EC HCO .,L T D.3.3 Changing PasswordTo enhance system security, users can regularly or irregularly change the advanceduser log-in password.Step 1 After advanced user login is successful, choose User > Change Password.Step 2 Enter the original password, and enter the new password twice. Then click OK.Figure 3-2 Changing passwordX I'A NN OV AS TA RT EC HC O.,LT D.4 Function OverviewShortcut button:This is used for configuration of the LED screens.Shortcut button:This is used for adjusting the LED displaybrightness. There are two ways for brightnessadjustment, automatic brightness and manualbrightness.Shortcut button:This is used to open the page for Multi-functioncard configuration.X I'AA RT EC HC OD.Shortcut button:Register the display screen to NovaiCare.Shortcut button:Calibrate the screen and manage the calibration coefficients.Screen Control Shortcut button:Perform the screen control functions which include "Black Out", "Freeze" and "Normal". Besides, self test options are also provided.Shortcut button:Enter the monitoring page to view the monitoring results or set the monitoring parameters.X I'A.,LT D.Shortcut button:To open the page which all test tools (test content) for LED displays testing are in.X I'AA RT EC H5Main Functions of NovaLCTWhen in the mode with no sending card, the control system software will have no sending card operation page, all the parameter setting related to the sending card shall be omitted, and other operations are the same as having sending card.5.1 Screen Configuration5.1.1 Screen Configuration Using System Configuration FilesThe advantage of using system configuration files to configure LED displays is that the configuration procedure is very simple and easy, and no manual configuration operation is required.Step 1 Click on the main interface, and the Screen Configuration windowpops up as shown in Figure 5-1.Figure 5-1 The Screen Configuration windowStep 2 Set the Current Operation Communication Port .If the control computer is connected to the synchronous system with one line,the communication port that the software defaults to is the current communication port.XI 'AN N OVA S T AR T EC HCO .,L T D.If the control computer is connected to multiple synchronous systems withdifferent lines, please choose the corresponding communication port of thesynchronous system to be configured.Step 3 Select the Load Config File option, use the Browse button to select the system configuration file to be loaded.Step 4 Click Next. The selected configuration file will be automatically loaded to the LED display system. The LED display system will have been configured when the loadoperation is finished.5.1.2 Smart Screen ConfigurationStep 1 Click the Screen Configuration button on the main interface, and then select Configure Screen.Step 2 Click Next and the window below will pop up.Figure 5-2 Screen Configuration – Receiving CardX I'A NN OV AS TA RT EC HC OStep 3 Choose Receiving Card > Smart Settings to open the Smart Settings Selection dialog. Shown in Figure 5-3.Figure 5-3 Smart SettingStep 4 Select Option 1: Smart setting and click Next to activate smart setting wizard. The Smart Setting Step 1 window will appear, as shown in Figure 5-4.X I'A NN OV AS TA RT EC HC O.,LT D.Figure 5-4 Smart Settings Guide 1●Module ChipSelect the driver chip type from the list according to what is actually used for the cabinets.●Data TypeSelect the data type from the list.●Module TypeThe option can be regular module or irregular module. If it is set to be irregularmodule, the counts of driver chips for one data set and one color should be given.● Quantity of Driver Chip with One Data GroupThis parameter is shown only when Irregular Module is selected. Users can set this parameter according to the module schematic diagram. ● Quantity of PixelsThis is the size of the real pixel array of a module. ● Row Decoding Type This list provides multiple options. You can choose one based on the module.● HUB ModeSelect the Hub mode of the receiving card, which could be normal, 20 groups, 24 groups and 28 groups. ●Ghost Control Signal PolaritySet the ghost control signal as high active or low active.XI 'AN N OVA S T AR T EC HCO .,L T D.Step 5 Click Next to access Smart Settings Guide 2. Shown in Figure 5-5 is the SmartSettings Guide 2 window.Figure 5-5 Smart Settings Guide 2Step 6 Click Next to access Smart Settings Guide 3. Shown in Figure 5-6 is the SmartSettings Guide 3 window.Figure 5-6 Smart Settings Guide 3Step 7 Complete the settings in Smart Settings Guide 3 according to the actual situation, and click Next to access Smart Settings Guide 4. Shown in Figure 5-7 is the Smart Settings Guide 4 window.XI 'AN N OVA S T EC HCO .,L T D.Figure 5-7 Smart Settings Guide 4Step 8 Complete the settings in Smart Settings Guide 4 according to the actual situation,and click Next to access Smart Settings Guide 5. Shown in Figure 5-8 is the Smart Settings Guide 5 window.Figure 5-8 Smart Settings Guide 5Step 9 Complete the settings in Smart Settings Guide 5 according to the actual situation,and click Next to access Smart Settings Guide 9. Shown in Figure 5-9 is the Smart Settings Guide 9 window.Click the corresponding grids according to the position of the lightened lights until no light is lightened any more. A line of the lightened lights routing will be drawn at the same time.XI 'AN N OVA S T AR T EC HCO .,L T D.Figure 5-9 Smart Settings Guide 9Note:Hold the left button of the mouse and drag, or use Tab and Enter to draw the routing line. Use Automatic Generation button to accomplish drawing routing lines of the same pattern. Clickorto zoom out or in the module layout.Step 10 A message indicating the finish will be shown when enough lights have beenprocessed. Click OK .Step 11 Click Next and a message pops up indicating the settings are completed, then clickOK .The Save Module Information dialog is shown in Figure 5-10. Saving the module settings to files will make it easier to perform module configuration for another LED displays constructed by modules which require the same settings as the one just set (Option 2 or Option 3 in Figure 5-3). Click Finish directly if you don't want to save the settings.XI 'AN N OVA S T AR T EC HCO .,L T D.Figure 5-10 The Save Module Information dialog5.1.3 Screen ConnectionSelect Screen Connection page in the Screen Configuration window (Figure 5-2). Enter screen number (number of the LED displays to be configured) and click Configure button, The default screen configuration page (page for standard LED display configuration) will displayed, as shown in Figure 5-11. Figure 5-11 Screen connectionQuantityThis is the number of LED displays that are to be configured.XI 'AN N OVA S T AR T EC HCO .,L T D.●ConfigureThis button is used to load the Screen Number to the NovaLCT application. ●Read form HWThis is used for the application to read the LED display information from the hardware.●Detect Communication StatusThis is used to check whether the communication within the current LED display is good.●Read the Number of Receiving CardsGet the number of receiving cards loaded by each of the Ethernet ports of the current sending card.●Enable Mapping (only supported by some receiving cards of the Armor series) When this function is opened, current serial number of the cabinet and its Ethernet port No. will be shown on the cabinet.●Load from File Load screen information files save on control computer.●Save to File This is used to save screen information files as screen information file (*.scr).●Send to HWThis is used to send the LED display configuration settings to the connected sending card.●Restore Factory SettingsReset current parameter configuration to factory settings.●Restore System ConfigurationReset current operating status of the system (or sending card, or receiving card) to the status in the backup file.●Back Up System ConfigurationBack up current configuration parameters. ● Save System Configuration File Save system configuration parameters as a file.● SaveThis is used to save the settings to a FLASH chip. The saved data won’t be lost even the hardware is powered off.Screen types include standard screen and complex screen. Configurations for different types of screen will be given as follow.Standard Screen ConfigurationSet the cascade type of receiving cards manually, as shown in Figure 5-11.●CoordinateThis is the upper-left corner of a rectangular area of the computer display. Therectangle area of the computer display is called mapping area. Content inside the mapping area will be shown on the LED display. The default location is (0, 0), which is actually the upper-left corner of the computer display.●Virtual ModeXI 'AN N OVA S T AR T EC HCO .,L T D.Specify the pixel mode of the LED display. The option could be real pixel or virtual 3 lights or virtual 4 lights.Check Enable to enable virtual mode, click to enter into the settinginterface of the virtual mode. Select the layout type of the lights on the top right corner of the window, and drag the mouse on the left side of the window to change the arrangement of the lights.For example, if the Rectangle is selected, the changed positions are as follows. Figure 5-12 Setting virtual mode● Receiving Card Columns/RowsThese are the numbers of columns and rows of the receiving card array of theLED display. A sketch map of the receiving card array will be shown in this page after these two parameters are set. ● Reset AllThis button is used to reset all cabinet settings and connection settings. ● Hidden WiringAfter selecting this function, the receiving card’s wiring in the following topology will be hidden.●This is a mark for receiving card classification. Select one receiving card and click on the drop-down box to choose one color from red, green and blue, and then click on the given receiving card to add the mark. ●Sending Card NumberXI 'AN N OVA S T AR T EC HCO .,L T D.This parameter is used to specify the current sending card (sending card). The sending card of the chosen index is will be set as the current sending card. And all relating settings are for this sending card.●Output Port NumberSelect an Ethernet port of the sending card. Click Read the Number of Receiving Cards and hover over the port with your mouse. The number of receiving cards loaded by the port will be displayed.●BackThis button is used to clear all settings related to the last set sending card. ●Clear Current Output Port This button is used to clear all settings related to the current output port.●Width/HeightThese are the width and height of the pixel array of the current receiving card.●Apply to the Entire ColumnSelect a receiving card, and set the width the same as the loading width of the column the selected receiving card belonged to.●Apply to the Entire LineSelect a receiving card, and set the height the same as the loading height of the line the selected receiving card belonged to.●Apply to the Current PortClick this button to set the pixel array sizes of all receiving cards connected to the current Ethernet port the same as that of the current receiving card.●Set BlankSelect this if the current position (pixel array of the current receiving card) needs to be left unset.●Quick ConnectionQuickly set cabinet connection. In Quick Connection , select a connection type. Drag the mouse to select the receiving cards corresponding to the output port. The connection is done automatically.●Auto Connection:Support quick cabinet connection by a single direction (supported only byMCTRL660 PRO).Complex Screen ConfigurationSet the sending card, Ethernet port, start coordinates and pixels to be loaded of each of the corresponding receiving cards.XI 'AOVA S T AR T EC HCO .,L T D.Figure 5-13 Complex screen configuration page●AddClick Add to access the window for receiving cards information setting, such as index of its host sending card, Ethernet output ports, mapping areas, pixel array sizes and so on. The setting will be shown in the list.●Edit To edit the information that has been set for receiving cards.●Delete To delete the selected receiving card from the receiving cards list. ●ClearTo delete all receiving cards from the list.5.1.4 Set Cabinet Information Pixel array size and module cascade direction can be set in this panel.Choose Screen Configuration > Receiving Card . In the Cabinet Information area, configure the cabinet information, as shown in Figure 5-14.XI 'A N N OVA S T AR T EC HCO .,L T D.。

Schwarcz Shadow Banking, Financial Markets, and the Real Estate Sector

Schwarcz Shadow Banking, Financial Markets, and the Real Estate Sector

2012-2013 S HADOW B ANKING AND R EAL E STATE 179 S HADOW B ANKING,F INANCIAL M ARKETS, AND THE R EALE STATE S ECTOR*S TEVEN L.S CHWARCZ**I. Overview of Shadow BankingA. IntroductionThe world’s financial system has been rapidly changing. A central feature of this change is disintermediation, which entails the removal of banks as financial intermediaries. The term “shadow banking” is often used as shorthand to refer to the disintermediated financial system. The “shadow banking system” consists of effectively all forms of financing that are not bank intermediated.1. ExamplesShadow banking encompasses structured finance and securitization, in which financing is indirectly raised by special-purpose entities (“SPEs”). It also includes financing and financial services provided by other non-bank financial intermediaries—such as finance companies, hedge funds, money-market mutual funds, real estate investment trusts (“REITs”),1 securities lenders engaging in repo lending, and investment banks.* Adapted from a “Firestarter” talk—prepared for the World Economic Forum’s annual Industry Partnership Strategists Meeting (held on October 3, 2012)—on transformation of the real estate sector in light of ongoing shifts in the financial markets and broader global trends.** Stanley A. Star Professor of Law & Business, Duke University School of Law, and Founding Director, Duke Global Capital Markets Center; schwarcz@. I thank the following professionals for helpful comments: Jason Kravitt and Stuart Litwin of Mayer Brown LLP; Eric Marcus and Warren Bernstein of Kaye Scholer LLP; and Eugene Pinover of Willkie Farr & Gallagher LLP.1 Although REITs have long preceded what is generally referred to as shadow banking, I include them because they are, technically, SPEs that issue securities and use the proceeds to invest in real estate properties.180 R EVIEW OF B ANKING &F INANCIAL L AW Vol.322. ImpactThe amount of non-bank intermediated (i.e., disintermediated) credit already “rivals” the amount of bank-intermediated credit provided to households and businesses.2 The trajectory of disintermediation suggests that disintermediated creditwill soon, if it does not already, exceed bank-intermediated credit.The gross amount of disintermediated credit was estimated to be nearly $20 trillion in March 2008,3 but is thought to have grown to atleast three times that level—between $60 and $67 trillion—in 2011.4Regulation3. RisksandThe paramount concern posed by the disintermediated financial system is that it can, if left unregulated, pose systemic risksto the entire financial system.5 Disintermediation makes it muchmore likely, for example, that market participants will engage in profitable but risky transactions even though doing so could externalize harm—including systemic harm—onto other market participants and even ordinary citizens.6 Notwithstanding such risks,2 Zoltan Pozsar et al., Shadow Banking (Fed. Reserve Bank of N.Y., StaffReport No. 458, 2010), available at /research/staff_reports/sr458.html(“The shadow banking system rivals the traditional banking system in the intermediation of credit to households and businesses.”).3Id.at 4.4Compare Philip Halstrick, Tighter Bank Rules Give Fillip to Shadow Banks, R EUTERS (Dec. 20, 2011, 4:17 AM), /article/2011/12/20/uk-regulation-shadow-banking-idUSLNE7BJ00T20111220 (indicating that the shadow banking sector was,at that time, a $60 trillion industry), with F IN.S TABILITY B D.,G LOBALS HADOW B ANKING M ONITORING R EPORT (2012), available at /publications/r_121118c.pdf (estimating shadow banking’s worldwide assets in 2011 at $67 trillion).5See, e.g.,Klára Bakk-Simon et al., Shadow Banking in the Euro Area: An Overview 4 (European Cent. Bank, Occasional Paper No. 133, 2012), available at http://www.ecb.europa.eu/pub/pdf/scpops/ecbocp133.pdf (observing that disintermediation is “one of the main sources of financial stability concerns”).6See infra Part IV.C (discussing responsibility failure). See generallySteven L. Schwarcz, Systemic Risk, 97 G EO.L.J.193, 206 (2008).2012-2013 S HADOW B ANKING AND R EAL E STATE 181 however, disintermediation can increase financial efficiency.7 The challenge will be to determine how shadow banking should be regulated to try to maximize its efficiencies while minimizing its risks.8B. How will Shadow Banking Impact the RealEstate Sector?Securitization, hedge funds, and REITs are especially relevant to the real estate sector.1. Because securitization is a critical means of enabling mortgage-loan originators to regain liquidity to make new loans (which I will discuss as a means of “funding regeneration”9), it is important both to the housing recovery and to commercial real estate generally. A common political response to the recent financial crisis, however, has been to restrict securitization.102. Hedge funds are becoming increasingly important originators of mortgage loans, as I will discuss.113. REITs might also be regarded as part of the shadow banking system.12 Although their use has long been concentrated in U.S. markets, they are becoming increasingly important in global7 Steven L. Schwarcz, Inaugural Address: Regulating Shadow Banking, 31 R EV.B ANKING &F IN.L. 619, 624–25 (2012) (explaining why shadow banking “may well constitute a public good by helping to achieve efficiencies”).8Id. at 641.(“Due to regulatory arbitrage and the increasing technological ability of non-banks to compete with traditional banks in providing financial products and services, shadow banking seems here to stay. I therefore have focused on how shadow banking should be regulated to try to maximize its efficiencies while minimizing its risks.”).9See infra Part III.10 Steven L. Schwarcz, The 2011 Diane Sanger Memorial Lecture, Protecting Investors in Securitization Transactions: Does Dodd-Frank Help, or Hurt?, 72 L A.L.R EV. 591, 593 & 596 (2012).11See infra Part II.A.2.12See supra note 1.182 R EVIEW OF B ANKING &F INANCIAL L AW Vol.32real estate finance.13 However, REITs are not significant real estateloan originators or funding regenerators.14II. FundingOriginationOriginationA. Mortgage-LoanOrigination1. BankBanks are currently observing very conservative real estate lending standards.15 Regulation such as Basel III may well motivatebanks to continue observing conservative real estate lending standards.162. Non-BankOriginationWhen banks observe conservative lending standards—either voluntarily or pursuant to regulation that applies only to banks—non-banks have an opportunity to begin competing in real estate loan origination. For example, I have been informed that hedge funds,both directly and through vehicles (such as SPEs) that issue securities to raise financing, are now originating a significant amountof commercial real estate lending in the United States.I also understand that hedge funds are actively engaged in acquiring residential mortgage-origination and servicing businesses, whichthey expect to be increasingly profitable.1713 Julius L. Sokol, The Proliferation of Global REITS and the Cross-Borderization of the Asian Market, 9 S AN D IEGO I NT’L L.J. 481, 487–88 (2008).14 Robert H. Bergdolt & Robert J. Le Duc, Public Nontraded Mortgage REITs—Issues and Opportunities, 7 J.T AX’N &F IN.P RODUCTS 47,48 (2008).15 The Monitor, Bank Regulation, 30 N O.8B ANKING &F IN.S ERVICESP OL’Y R EP. 22, 25 (2011) (discussing the ease with which banks will comply with Basel III because of their current risk-averse practices).16See id.17 E-mail from Stuart Litwin, Partner, Mayer Brown LLP, to the author (Sept. 6, 2012) (on file with author).2012-2013 S HADOW B ANKING AND R EAL E STATE 1833. Government Roles in Mortgage-LoanOrigination(i) Governments worldwide are increasingly considering restricting residential mortgage-loan origination standards.18 Overly restrictive origination standards could, of course, impede the housing recovery.(ii) In the United States, for example, mortgage lending willbe strongly driven by what is known as the Qualified Mortgage (“QM”) definition for making mortgage loans. This definitional limitation is mandated by § 1411 of the Dodd-Frank Act, which amends the Truth in Lending Act to prohibit a lender from making a residential mortgage loan unless the lender “makes a reasonable and good faith determination . . . that the consumer has a reasonable ability to repay the loan . . . .”19U ntil the definition is finalized, parties cannot estimate creditcost or availability. This contributes to the conundrum that, although today’s low interest rates and home prices should make housing very18See, e.g., C RAIG A LEXANDER,D EREK B URLETON,&D IANA P ETRAMALA,T IGHTER M ORTGAGE R ULES TO C OOL D EBT G ROWTH, BUT H IGHER R ATESU LTIMATELY R EQUIRED (2012), available at /document/PDF/economics/special/dp0912_mortgage_rules.pdf (discussing the tightening mortgage lending standards in Canada).19 Dodd-Frank Wall Street Reform and Consumer Protection Act § 1411(a)(2), 15 U.S.C. 1639c(a)(1) (Supp. V 2011) (emphasis added) (“In accordance with regulations prescribed by the Bureau, no creditor may make a residential mortgage loan unless the creditor makes a reasonable andgood faith determination based on verified and documented information that, at the time the loan is consummated, the consumer has a reasonable ability to repay the loan, according to its terms, and all applicable taxes, insurance (including mortgage guarantee insurance), and assessments.”). InApril 2011, the Federal Reserve Board delegated its issuance authority to its Consumer Financial Protection Bureau (CFPB), which issued a proposedrule amending Regulation Z. Under that proposal, a QM loan would requirethat several specific underwriting factors be considered and verified. SeePress Release, Fed. Reserve Bd., 2011 Banking and Consumer Regulatory Policy (Apr. 19, 2011), available at / newsevents/press/bcreg/20110419a.htm (“The Federal Reserve Board on Tuesday requested public comment on a proposed rule under Regulation Zthat would require creditors to determine a consumer's ability to repay a mortgage before making the loan and would establish minimum mortgage underwriting standards.”).184 R EVIEW OF B ANKING &F INANCIAL L AW Vol.32affordable, many ordinary families cannot qualify for mortgage loans.20 Furthermore, the final QM definition will strongly impact the availability and cost of credit because borrowers will have strong incentives to litigate mortgage loans that, in retrospect, arguably fall outside that definition. Under proposed law, for example, an ability-to-repay violation would be a defense against foreclosure; also, a lender losing an ability-to-repay lawsuit would become subject to “enhanced damages,” which include liability for actual damages, double finance charges, and all costs.21 Attempts to finalize the QM definition thus face an inherent tension between protecting borrowersand ensuring reasonable credit availability.One way to help resolve this tension would be to allow a definitional alternative option for a QM loan, based on the loan-to-value ratio. For example, there could be a non-exclusive regulatorysafe harbor if the collateral value is at least 1.X times the loan principal (where X equals an integer). This would be somewhat analogous to Regulation U of the Federal Reserve, which requires margin loans secured by margin stock to be collateralized at least2:1.22 I am not suggesting, however, that real estate loans need asmuch overcollateralization as margin loans. I understand that residential mortgage loans in Canada, for example, are keyed to onlyan 80% maximum loan-to-value ratio.23(iii) The Financial Stability Oversight Council (“FSOC”)may be considering taking further action to proactively regulate20 Robert Hardaway, The Great American Housing Bubble: Re-examiningCause and Effect, 35 U.D AYTON L.R EV. 33, 50 (2009) (noting that one-third of Americans cannot afford to purchase a home).21Regulation Z; Truth in Lending, 76 Fed. Reg. 91, 27391, 91, 27396 (proposed May 11, 2011) (to be codified at 12 C.F.R. 226).22See 12 C.F.R. § 221.7(a) (2012) (“The maximum loan value of any margin stock is fifty per cent of its current market value. “) It is only somewhat analogous because, unlike Regulation U, the definitional alternative option for a QM loan would be non-exclusive.23 Canadian Bank Act, S.C. 1991, c. 46, s. 418(1) (Can.) (“A bank shall notmake a loan in Canada on the security of residential property in Canada forthe purpose of purchasing, renovating or improving that property, or refinance such a loan, if the amount of the loan, together with the amountthen outstanding of any mortgage having an equal or prior claim against the property, would exceed 80 per cent of the value of the property at the timeof the loan.”).2012-2013 S HADOW B ANKING AND R EAL E STATE 185 mortgage origination in the United States.24 Also, I understand that there are worldwide regulatory efforts to impose restrictions and safety nets for mortgage loans.(iv) Government may play other roles in mortgage origination—subject to the caveat that any government action would, of course, affect private market incentives. Should governments consider, for example, providing mortgage-loan guarantees, perhaps for the early years of a mortgage, much as they do for project financing during the risky construction phase? Should governments consider making credit available to mortgage-loan originators to enhance the liquidity of key real estate markets?25(v) Also, given the very long-term nature of typical mortgage loans, what will be the impact of Basel III’s aversion to short-term “wholesale” funding to finance loan/asset books?26 Will mortgage loans be made for shorter periods? I understand that shorter term mortgage lending is already becoming common in some countries. Although shorter terms could help to mitigate lending risk, it could increase the burden on borrowers.24See Helen Mason, No One Saw It Coming —Again Systemic Risk and State Foreclosure Proceedings: Why a National Uniform Foreclosure Law is Necessary, 67 U. M IAMI L.R EV. 41, 73–74 (2012) (noting that the FDIC has asked the Financial Stability Oversight Council to examine the risks posed by mortgage servicing and foreclosure).25 In that regard, compare the role of Federal Home Loan Banks in the United States. See Adam B. Ashcraft et al., The Federal Home Loan Bank System: The Lender of Next-to-Last Resort? 2-3 (Fed. Reserve Bank of N.Y., Staff Report No. 357, 2008), available at / research/staff_reports/sr357.html.26See Francisco Vazquez & Pablo Federico, Bank Funding Structures and Risk: Evidence from the Global Financial Crisis 5, 16 (Int’l Monetary Fund, Working Paper No. 12/29, 2012), available at /external/pubs/ft/wp/2012/wp1229.pdf (concluding that Basel III addressed their findings, which included bank overreliance on wholesale funding before the economic crisis).32 186 R EVIEW OF B ANKING &F INANCIAL L AW Vol.LoansMortgageB. Alternativesto1. Alternative Forms of AccessTo what extent will restricted loan origination motivate alternative forms of “access”—such as leasing and other non-ownership rights—to use real property? Leasing is important in somenon-U.S. markets.27 Since the financial crisis, the leasing of residential real estate has become increasingly important in the U.S.282. Rental Payments as Financial AssetsAs alternative forms of access grow, one can envision regenerating funding through securitization.29 Lease rental payments,for example, are “financial assets,” and at least theoretically all typesof financial assets can be securitized.RegenerationIII. FundingA. SecuritizationRecall that, because securitization is a critical means of enabling mortgage-loan originators to regain liquidity to make new loans, it is important to both the housing recovery and commercialreal estate generally. For example, a mortgage-loan originator that makes mortgage loans totaling $X can securitize the loans and regainclose to $X of liquidity to make additional loans. These additionalloans can likewise be securitized, enabling the mortgage-loan originator to make further additional loans. This cycle can continue, perhaps enabling a mortgage-loan originator starting with $X to make, for example, loans aggregating close to three or four times that amount per year.27 Thomas J. Sugrue, The New American Dream: Renting, W ALL S T.J.,Aug. 15, 2009, at W1, available at /article/SB10001424052970204409904574350432677038184.html (noting that in Germany, France, and Switzerland, renting is more common than buying).28Id.29See infra Part III.A.2012-2013 S HADOW B ANKING AND R EAL E STATE 187Securitization1. GSEGovernment-sponsored enterprise (“GSE”) securitization is, through the monetization of mortgage loans, currently the primary domestic source of funding regeneration.30 This is partially driven by regulation. The Dodd-Frank Act, for example, imposes a 5% minimum unhedged risk-retention (“skin in the game”) requirement for non-GSE mortgage-loan securitizations.31 In this way, GSE securitization is inconsistent with the goal of the Obama administration’s white paper on housing finance, which contemplates phasing out the GSEs and enticing more “private capital” into the system.32To some extent, however, GSE securitization reflects a post-financial crisis move to safety.33 As discussed below, however, there may be a trend in today’s financial markets toward increasing tolerance for risk.3430 Sec. & Fin. Mkts. Ass’n, Comments on “FHA-Rural Regulatory Improvement Act of 2011” (May 24, 2011), available at /uploadedfiles/052511sifma.pdf (indicating that GSEs are the largest issuers of mortgage-backed securities).31 Dodd-Frank Wall Street Reform and Consumer Protection Act §941(b), 15 U.S.C. 78o-11(c)(1)(i)(B) (Supp. V 2011). Risk Retention ties into the Qualified Residential Mortgage (“QRM”) rule because the risk-retention requirement does not apply to securitizing QRMs. Six federal agencies are jointly responsible for issuing this rule. QRMs are to be a higher quality subset of Qualified Mortgage (QM) loans. On March 11, 2011, the six agencies proposed a very tight QRM definition. There has been no subsequent release as to when a final rule will be issued.32See generally U.S.D EP’T OF THE T REASURY &U.S.D EP’T OF H OUS.& U RBAN D EVELOPMENT,R EFORMING A MERICA’S H OUSING M ARKET:A R EPORT TO C ONGRESS 1–2(2011)(outlining the Obama administration’s positions on housing finance).33 Thus, Ginnie Mae, which is wholly-owned by the U.S. government, has grown even more important as compared to Fannie Mae and Freddie Mac. Foreign investors often prefer Ginnie Mae securities because they are backed by a full U.S. government guarantee. Even though the yields on Ginnie Mae securities are lower than on Fannie and Freddie securities, investors are concerned about Fannie and Freddie because they are private entities (albeit “federally chartered” or “government sponsored”), having only a line of credit to the U.S. Treasury.34See infra Part IV.A.2.188 R EVIEW OF B ANKING &F INANCIAL L AW Vol.322. Non-GSE SecuritizationIt is hard to predict the future of the residential mortgage-backed securities (“RMBS”) market. However, until that market is weaned from the GSEs, the level of residential real estate financingmay be limited.B. CoveredBonds1. The use of covered bonds, like securitization, can alsoserve as a way to monetize mortgage loans.35 Some covered bond regimes are statutory and some are contractual. Statutory regimes are generally safer for investors because they provide legislative safe harbors. The United States does not yet have a statutory coveredbond law.2. The relationships and differences between securitizationand covered bond transactions are complex. Although investors sometimes view covered bonds as preferable to securitization, covered bond transactions are more likely than securitization transactions to harm unsecured creditors of mortgage-loan originators.36IV. Controlling Future Real Estate Financing RiskNo matter how funding origination and funding regenerationare regulated, there are likely to be future financial failures. This is because shadow banking can trigger three types of market failures: information failure, agency failure, and responsibility failure (the lastof which is often addressed as “externalities”). Regulation cannot completely address these three types of market failure.35See generally Steven L. Schwarcz, The Conundrum of Covered Bonds, 66B US.L AW. 561 (2011) (discussing covered bonds in connection with mortgage securitization).36See id. at 586.2012-2013 S HADOW B ANKING AND R EAL E STATE 189FailureA. InformationInformation1. AsymmetricBy increasing complexity, shadow banking can cause information failure by making financial transactions and products more difficult to disclose and understand. In the recent financial crisis, for example, it appears that neither investors nor underwriters always fully understood and appreciated the potential consequences of complex, highly-leveraged ABS CDO securities, which were largely payable from securities that themselves were payable from underlying mortgage loans.37Rationality2. BoundedAlthough sometimes categorized separately, this can be viewed as a subset of information failure.(i) We have difficulty, for example, appreciating unlikely events that, if they occur, could have devastating consequences.38 In this context, note the parallel between subprime margin loans as a causal factor in the Great Depression (when the rising stock market collapsed, many of these loans became undercollateralized),39 and subprime mortgage loans as a causal factor in the recent financial crisis (when the rising housing market collapsed, many of these loans likewise became undercollateralized).40 In both cases, observers critically under-appreciated the systemic consequences of a precipitous drop—unprecedented in then-recent history—in collateral value.4137 Steven L. Schwarcz, Regulating Complexity, 87 W ASH.U.L.R EV. 211, 241–42 (2009).38 Iman Anabtawi & Steven L. Schwarcz, Regulating Systemic Risk: Towards an Analytical Framework, 86 N OTRE D AME L.R EV. 1349, 1366-68 (2011) (“Optimism bias and availability bias play a role in explaining why individuals systematically underestimate the likelihood of very rare but potentially devastating risks—a phenomenon known as ‘disaster myopia.’ People are unrealistically optimistic when thinking about extreme events with which they have no recent experience, and they may undervalue the importance of those events.”).39Id. at 1356–57.40Id. at 1360.41Id. at 1357 & 1360.190 R EVIEW OF B ANKING &F INANCIAL L AW Vol.32(ii) We also have short memories. Although in late 2008 andearly 2009 no investor would buy anything that did not have a government guarantee, there is a trend in today’s financial markets toward increasing tolerance for risk. To obtain higher returns, investors—especially hedge funds—are now buying AAA/Aaa subprime auto and A-rated prime auto paper and are looking at otherasset classes. We now appear to have a vibrant collateralized loan obligation market for non-mortgage asset classes (which looks in all respects like the old collateralized debt obligation (“CDO”) market,albeit with a different name).42 Even the market for commercial mortgage-backed securities is improving, although the market for RMBS is still uncertain.43Short memories, however, may not fully explain risk cyclesand today’s market’s increasing tolerance for risk. This trend mayalso be explained as evidence of a swing back to normalcy from theearlier overreaction or as a result of competitive investors fighting toget high returns.44FailureB. Agency1. By increasing complexity, shadow banking can increasethe potential for agency failure (meaning principal-agent failure, as opposed to GSE “agency” failure).2. The biggest problem may not be the traditional agency conflict between a firm’s owners and senior managers but, instead,the conflict between a firm’s senior managers and its secondary managers (such as vice presidents and analysts).45 Because secondary managers are typically paid on a short-term basis, including throughyearly bonuses, and often move from firm to firm, their interests do42 E-mail from Litwin, supra note 17.43Id.44 Litwin also observes that governments worldwide have made it an economic policy to keep interest rates low to stimulate their economies and economic troubles have dramatically increased the demand for low-risk government securities. Short-term, AAA/Aaa-rated, asset-backed securitieshave a somewhat greater return than—and have become a reasonable substitute for—other low risk investments. Id.45See generally Steven L. Schwarcz, Conflicts and Financial Collapse: The Problem of Secondary-Management Agency Costs, 26 Y ALE J. ON R EG.457 (2009) (detailing conflicts of interest between firms and secondary managers).2012-2013 S HADOW B ANKING AND R EAL E STATE 191 not necessarily align with the long-term interests of their firms. Even more apropos to shadow banking, secondary managers may well have a better technical understanding of complex investments and transactions, so they can—and in the recent financial crisis, often likely did—recommend investments and transactions that generate high returns, and thus high bonuses to them, even though the investments and transactions pose real long-term risks to their firms.463. Agency failure is, theoretically, one of the easiest types of failure to try to manage by regulation.47 But to the extent managers can move to jobs in different countries, effective regulation will require international governmental cooperation.FailureC. Responsibility1. Shadow banking also makes it much more likely that market participants will engage in profitable but risky transactions, although doing so could externalize harm—including systemic harm—onto other market participants and even ordinary citizens. Economists would see this as fitting into the traditional market-failure category of “externalities.”2. “Externalities,” however, is a counterintuitive and confusing term for a market-failure category because it conflates cause and effect. Externalities are consequences, not causes, of market failure. We need to focus more on the cause of those externalities, which I will call responsibility failure.483. For example, limited liability is an important source of responsibility failure that can lead to externalities. Because investors in firms are not personally liable for the liabilities of their firms, the interests of investors may conflict with the interests of their firms46 Id. at 460 (discussing how secondary managers used value-at-risk to accomplish this).47Id. at 465–69 (discussing possible solutions, including aligning com-pensation incentives).48See generally Steven L. Schwarcz, Regulating Shadows: Financial Disintermediation and the Need for a Common Language (Oct. 9, 2012) (unpublished working paper), available at /abstract=2159455 (explaining and developing the concept of responsibility failure).。

全球监管大语言模型

全球监管大语言模型

随着人工智能技术的快速发展,特别是大语言模型的出现,全球范围内对其进行监管的需求也日益增加。

以下是一些全球监管大语言模型的关键方面:1. 数据隐私和安全:大语言模型通常需要大量的数据来训练和运行,因此数据的隐私和安全是重要的监管问题。

监管机构应确保数据的收集、使用和存储符合相关的隐私法规,并采取措施保护数据免受泄露和滥用。

2. 透明度和可解释性:大语言模型的决策过程可能很难理解,这使得透明度和可解释性成为关键问题。

监管要求可能包括模型的透明度,以确保用户能够理解其输出结果的依据和原因。

3. 偏见和公平性:由于训练数据的偏差或模型设计的问题,大语言模型可能存在偏见和不公平的结果。

监管应关注如何减少偏见,并确保模型在各种群体中的公平性和公正性。

4. 伦理和社会责任:大语言模型的应用可能会对社会和个人产生重大影响,因此需要考虑伦理和社会责任。

监管机构应制定准则,以确保模型的开发和使用符合道德和伦理标准。

5. 资质和认证:对于某些特定领域的大语言模型,如医疗或金融,可能需要特定的资质和认证,以确保其可靠性和准确性。

6. 跨国家和地区的协调:由于大语言模型的应用跨越国界,国际间的协调和合作至关重要。

不同国家和地区的监管机构需要共同努力,制定一致的标准和规则。

7. 公众教育和意识:除了监管措施外,提高公众对大语言模型的理解和意识也很重要。

公众应该了解其局限性、潜在风险以及如何负责任地使用它们。

这些方面只是监管大语言模型的一些关键要点,具体的监管措施和政策将根据不同的国家和地区以及具体的应用场景而有所不同。

此外,随着技术的不断发展,监管也需要不断适应和更新,以确保大语言模型的健康发展和合理应用。

影子银行的监管Word版

影子银行的监管Word版

摘要金融是经济的命脉,而银行在金融体系中有举足轻重的作用,加强对银行的监管意义重大。

2008年的金融危机暴露出金融系统的诸多问题,也引发了人们对影子银行的关注,探究影子银行的运作机制,加强对影子银行的监管成为规范金融系统的重要举措。

健康运行的影子银行系统有助于增强金融系统的稳定性与灵活性,降低和控制各类风险。

本文从影子银行的概念和运行机制入手,分析了影子银行对经济运行的宏微观作用,着重探讨了影子银行的风险情况及监管现状,在此基础上提出了加强对于影子银行监管的建议。

关键词:影子银行,风险,监管AbstractFinance is the lifeblood of the economy, and banks play an important role in financial system. So it’s important to strengthen the supervision of banks. 2008 financial crisis has exposed the many problems the financial system, but also raised the specter of shadow banking concern, to explore the operation of the shadow banking system, strengthen the supervision of the shadow banking system as an important measure for regulating financial. Healthy operation of the shadow banking system helps to strengthen the financial system stability and flexibility, reduce and control the various risks.In this paper, we introduces the concept and operation of the shadow banking system, Then we analyzes the shadow banking on the role of macro and micro economic operation. We focused on the shadow banking risks and regulatory status quo, in this based on the proposal for strengthening the proposal for the shadow banking supervision.Key words:Shadow bank, Risks, Supervision整理为word格式目录摘要 (I)Abstract (I)目录 ........................................................... I I 一、影子银行理论概述 .. (1)(一)影子银行的概念 (1)(二)影子银行的运作机制 (2)(三)影子银行的作用 (2)二、影子银行的风险分析 (3)(一)投资银行不合理的金融产品设计与公司治理结构 (4)(二)借短贷长、高杠杆的经营模式 (4)(三)贷款机构的“逆向选择”与借款人的“道德风险” (5)(四)经营活动不透明,监管制度缺失 (5)(五)评级机构的虚假评级 (6)(六)不同市场间、全球间金融联系日益密切,风险易发生传递 (6)三、影子银行监管现状 (6)(一)危机前金融管制的放松 (6)(二)危机后各国加强金融监管 (7)四、影子银行的风险控制及监管建议 (9)(一)强化对影子银行的预防性监管 (9)(二)完善影子银行内部相关机制 (9)(三)改革信用评级制度,增强评级权威性 (10)(四)改革监管体制,扩大监管范围 (10)(五)加强国际金融监管合作,共同控制风险 (10)整理为word格式结论 (11)参考文献 (1)致谢 (2)整理为word格式影子银行的风险与监管金融危机对经济的巨大冲击引发了我们对金融行业的深刻思考,也引起了全球各国对金融监管的改革与反思。

黑客向全球银行业宣战 银行该如何保护我们的财产

黑客向全球银行业宣战 银行该如何保护我们的财产

黑客向全球银行业宣战银行该如何保护我们的财产
木须
【期刊名称】《信息安全与通信保密》
【年(卷),期】2016(0)6
【摘要】就在5月3日,匿名者组织就曾对希腊央行发动过DDo S攻击,一度迫使
希腊央行服务器离线超过6小时,此前匿名者组织还先后对汇丰银行(中国香港)、土耳其银行发动过类似攻击。

5月5日,黑客组织匿名者(Anonymous)针对世界银行业发起了#Op Icarus运动,并对塞浦路斯央行发起大规模DDo S攻击。

就在
5月3日,匿名者组织就曾对希腊央行发动过DDo S攻击,一度迫使希腊央行服务器离线超过6小时,此前匿名者组织还先后对汇丰银行(中国香港)、土耳其银行发
动过类似攻击。

【总页数】2页(P52-53)
【关键词】中国香港;汇丰;信用卡交易;网络攻击;网络系统;网络安全;纽约证交所;金融机构;数据集;对账单
【作者】木须
【作者单位】
【正文语种】中文
【中图分类】TP393.08
【相关文献】
1.黑客案件频发引发全球银行业担忧 [J], ;
2.真正全球性的银行业大调整——世纪之交全球银行业并购浪潮评析 [J], 张德辉
3.全球银行业竞争结构演变与中国银行业发展战略调整——基于2015年度"全球银行1000排行榜"的分析 [J], 刘昊虹;李石凯
4.构筑银行业消费者权益保护工作体系--《银行业消费者权益保护工作指引》述评[J], 李泽
5.全球银行业系统性风险及其对我国银行业的溢出效应 [J], 王燕芬
因版权原因,仅展示原文概要,查看原文内容请购买。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Global Shadow Banking Monitoring Report 201218 November 2012Table of contentsExecutive Summary (3)Introduction (6)1.Methodology (6)2.Overview of macro-mapping results (8)3.Cross-jurisdiction analysis (12)3.1Structure of financial systems (12)3.2Growth trends of non-bank financial intermediaries across jurisdictions (14)position of non-bank financial intermediaries (15)4.1Breakdown by sub-sectors of non-bank financial intermediaries at end-2011 (15)4.2Recent trends in sub-sectors (18)5.Interconnectedness between banks and shadow banking entities (non-bank financial intermediaries) (20)5.1Analysing interconnectedness between banks and shadow banking entities (20)5.2High-level analysis of interconnectedness (21)5.3Data Issues for further enhancement of monitoring (23)6.Finance Companies - Overview of Survey Responses (25)6.1Definition and types of finance companies (25)6.2Regulatory frameworks (25)6.3Policy tools and monitoring frameworks to address shadow banking risks (26)6.4Business models (26)6.5Risks (27)Annex 1: Template used for the data collection exerciseAnnex 2: Share of total assets by jurisdictionAnnex 3: Survey questionnaire on finance companiesAnnex 4: “Possible Additional Measures of Interconnectedness between Banks and Shadow Banking System”Annex 5: Country case studies on (i) Dutch Special Financial Institutions (ii) Financial Companies in India and (iii) Securities Lending in the United States.Executive SummaryThe “shadow banking system” can broadly be described as “credit intermediation involving entities and activities outside the regular banking system”. Although intermediating credit through non-bank channels can have advantages, such channels can also become a source of systemic risk, especially when they are structured to perform bank-like functions (e.g. maturity transformation and leverage) and when their interconnectedness with the regular banking system is strong. Therefore, appropriate monitoring and regulatory frameworks for the shadow banking system needs to be in place to mitigate the build-up of risks.The FSB set out its initial recommendations to enhance the oversight and regulation of the shadow banking system in its report to the G20 in October 2011.1 Based on the commitment made in the report, the FSB has conducted its second annual monitoring exercise in 2012 using end-2011 data. In the 2012 exercise coverage was broadened to include 25 jurisdictions and the euro area as a whole, compared to 11 jurisdictions and the euro area in the 2011 exercise. The addition of new jurisdictions brings the coverage of the monitoring exercise to 86% of global GDP and 90% of global financial system assets.The exercise was conducted by the FSB Analytical Group on Vulnerabilities (AGV), the technical working group of the FSB Standing Committee on Assessment of Vulnerabilities (SCAV), using quantitative and qualitative information, and followed a similar methodology as that used for the 2011 exercise. Its primary focus is on a “macro-mapping” based on national Flow of Funds and Sector Balance Sheet data (hereafter Flow of Funds), that looks at all non-bank financial intermediation2 to ensure that data gathering and surveillance cover the areas where shadow banking-related risks to the financial system might potentially arise.The main findings from the 2012 exercise are as follows3:•According to the “macro-mapping” measure, the global shadow banking system, as conservatively proxied by “Other Financial Intermediaries” grew rapidly before the crisis, rising from $26 trillion in 2002 to $62 trillion in 2007.4 The size of the totalsystem declined slightly in 2008 but increased subsequently to reach $67 trillion in 2011 (equivalent to 111% of the aggregated GDP of all jurisdictions). Compared to last year’s estimate, expanding the coverage of the monitoring exercise has increasedthe global estimate for the size of the shadow banking system by some $5 to $6trillion.•The shadow banking system’s share of total financial intermediation has decreased since the onset of the crisis and has remained at around 25% in 2009-2011, after having peaked at 27% in 2007. In broad terms, the aggregate size of the shadowbanking system is around half the size of banking system assets.1/publications/r_111027a.pdf2Unless otherwise mentioned, non-bank financial intermediation (or intermediaries) excludes intermediation by insurance companies, pension funds and public financial institutions.3The figures in this report are subject to change until the report is published.4“Other Financial Intermediaries” are a category of Flow of Funds that comprises financial institutions that are not: banks, central banks, public financial institutions, insurance companies or pension funds.•The US has the largest shadow banking system, with assets of $23 trillion in 2011, followed by the euro area ($22 trillion) and the UK ($9 trillion). However, the US’share of the global shadow banking system has declined from 44% in 2005 to 35% in2011. This decline has been mirrored mostly by an increase in the shares of the UKand the euro area.•There is a considerable divergence among jurisdictions in terms of: (i) the share of non-bank financial intermediaries (NBFIs) in the overall financial system; (ii) relative size of the shadow banking system to GDP; (iii) the activities undertaken bythe NBFIs; and (iv) recent growth trends.•The Netherlands (45%) and the US (35%) are the two jurisdictions where NBFIs are the largest sector relative to other financial institutions in their systems5. The share ofNBFIs is also relatively large in Hong Kong (around 35%), the euro area (30%), Switzerland, the UK, Singapore, and Korea (all around 25%).•Jurisdictions where NBFIs are the largest relative to GDP are Hong Kong (520%), the Netherlands (490%), the UK (370%), Singapore (260%) and Switzerland (210%).Part of this concentration can be explained by the fact that these jurisdictions are significant international financial centres that host activities of foreign-ownedinstitutions.•After the crisis (2008-2011), the shadow banking system continued to grow although at a slower pace in seventeen jurisdictions (half of them being emerging markets anddeveloping economies undergoing financial deepening) and contracted in the remaining eight jurisdictions.•National authorities have also performed more detailed analyses of their NBFIs in the form of case studies, examples of which are presented in Annex 56. Although further data and more in-depth analysis may be needed, these studies illustrate theapplication of risk factor analysis (e.g. maturity/liquidity transformation, leverage, regulatory arbitrage) to narrow down to a subset of entities and activities that mightpose systemic risk.•Among the jurisdictions where data is available, interconnectedness risk tends to be higher for shadow banking entities than for banks. Although further analysis may beneeded with more cross-border and prudential information, shadow banking entitiesseem to be more dependent on bank funding and are more heavily invested in bankassets, than vice versa.•Regarding finance companies, which are a focus area for this year’s report, the survey responses from 25 participating jurisdictions suggest the existence of a widerange of business models covered under the same label. The responses also underlined the important role finance companies play in providing credit to the realeconomy, especially by filling credit voids that are not covered by other financial 5According to case studies presented in annex 5, a closer analysis of the Dutch shadow banking sector shows that most non-bank entities are so-called special financial institutions (SFIs) rather than shadow banks, which are mainly tax-driven.6These case studies are examples of applying the proposed framework to the currently available data in certain member jurisdictions and do not necessarily represent the assessment of the FSB.institutions. A few jurisdictions have also emphasised the need to enhance monitoring of the sector as finance companies may be liable to specific risk factorsand/or regulatory arbitrage. However, since the size of the sector is limited, participating jurisdictions do not see significant systemic risks arising from this sector at present.Going forward, the monitoring exercise should benefit from continuous improvement and thorough follow-up by jurisdictions of identified gaps and data inconsistencies. It is also important that the monitoring framework remains sufficiently flexible, forward-looking and adaptable to capture innovations and mutations that could lead to growing systemic risks and arbitrage.Further improvements in data availability and granularity will be essential for the monitoring exercise to be able to adequately capture the magnitude and nature of risks in the shadow banking system. This is especially relevant for those jurisdictions that lack fully developed Flow of Fund statistics (e.g. China, Russia, Saudi Arabia) or have low granularity at the sector level resulting in a relatively large share of unidentified NBFIs (e.g. UK, euro area-wide Flow of Funds). Data enhancing efforts may leverage off on-going initiatives to improve Flow of Funds statistics (e.g. the IMF/FSB Data Gaps initiatives) or on supervisory information and market intelligence as a complement to Flow of Funds data. Survey data or market estimates can also be used more extensively for those parts of the shadow banking system (e.g. hedge funds) for which Flow of funds do not provide a reliable estimate.The use of additional analytical methods based on market, supervisory and other data to conduct deeper assessment of risks, for example, maturity transformation, leverage and interconnectedness (see as an illustration Annex 4) would also provide significant value added to the report.Lastly, the mostly entity-based focus of the “macro-mapping” should be complemented next year by obtaining more granular data on assets/liabilities (e.g. repos, deposits) or expanding activity-based monitoring, to cover developments in relevant markets where shadow banking activity may occur, such as repo markets, securities lending and securitisation. In addition to existing supervisory and market information, the implementation of some of the shadow banking regulatory recommendations, such as the transparency recommendations from the FSB Workstream on securities lending and repos (WS5), is expected to provide the necessary data for such an enriched monitoring.77/publications/r_121118b.pdfIntroductionEfficient monitoring of the size and of the adaptations and mutations of shadow banking are important elements for strengthening the oversight of this sector, which is a key priority for the FSB and the G20. In its report “Shadow Banking: Strengthening Oversight and Regulation” to the G20 (hereafter October 2011 Report)8, the FSB set out approaches for effective monitoring of the shadow banking system and has published the results of its first attempt to map the shadow banking system using data from eleven of its member jurisdictions9 and the euro area. It also committed to conducting annual monitoring exercises to assess global trends and risks in the shadow banking system through its Standing Committee on Assessment of Vulnerabilities (SCAV), drawing on the enhanced monitoring framework defined in the report.Based on this commitment, the FSB recently conducted its annual monitoring exercise for 2012, significantly broadening the range of jurisdictions covered to include all 24 FSB member jurisdictions, Chile10, and the euro area. This expanded coverage enhances the comprehensive nature of the monitoring, since participating jurisdictions represent in aggregate 86% of global GDP and 90% of global financial system assets (up from 60% and 70% per cent, respectively). The exercise was conducted by the Analytical Group on Vulnerabilities (AGV), the technical working group of the SCAV, during summer 2012, using end-2011 data as well as additional qualitative information and market intelligence. This report summarises the preliminary results of the 2012 monitoring exercise.1.MethodologyIn its October 2011 report, the FSB broadly defined shadow banking as the system of credit intermediation that involves entities and activities fully or partially outside the regular banking system, and set out a practical two-step approach in defining the shadow banking system:•First, authorities should cast the net wide, looking at all non-bank credit intermediation to ensure that data gathering and surveillance cover all areas whereshadow banking-related risks to the financial system might potentially arise.•Second, for policy purposes, authorities should narrow the focus to the subset of non-bank credit intermediation where there are (i) developments that increase systemicrisk (in particular maturity/liquidity transformation, imperfect credit risk transfer and/or leverage), and/or (ii) indications of regulatory arbitrage that is underminingthe benefits of financial regulation.Based on the above approach, the FSB recommended that authorities enhance their monitoring framework to assess shadow banking risks through the application of a stylised monitoring process, guided by seven high-level principles. This process would require authorities to first assess the broad scale and trends of non-bank financial intermediation in 8/publications/r_111027a.pdf9These were Australia, Canada, France, Germany, Italy, Japan, Korea, the Netherlands, Spain, the UK and the US.10Chile participates in the AGV and voluntarily participated in the exercise.the financial system (“macro-mapping”), drawing on information sources such as Flow of Funds and Sector Balance Sheet data (hereafter Flow of Funds data), and complemented with other relevant information such as supervisory data. Authorities should then narrow down their focus to credit intermediation activities that have the potential to pose systemic risks, by focusing in particular on activities involving the four key risk factors as set out in the second step (i.e. maturity/liquidity transformation, imperfect credit risk transfer and/or leverage).In line with these recommendations, the 2012 annual monitoring exercise primarily focused on the “macro-mapping” or the first phase of the stylised monitoring process through collecting the following data and information from 25 jurisdictions and the euro area:(i) Flow of Funds data as of end-201111based on the template used for the 2011monitoring exercise and recommended in the October 2011 report (Annex 1);(ii) A short analysis of national trends in shadow banking; and(iii) Additional data and qualitative information on “finance companies” based on a survey questionnaire.In addition, on a voluntary basis, several jurisdictions provided case studies on specific entities or activities involved in non-bank financial intermediation in their jurisdictions.12 Flow of Funds data are a useful source of information in mapping the scale and trends of non-bank credit intermediation. They provide generally high quality, consistent data on the bank and non-bank financial sectors’ assets and liabilities, and are available in most jurisdictions, though there is room for improvement.13 The components related to the non-bank financial sector, and especially the “Other Financial Intermediaries (OFIs)” sector (which typically includes NBFIs that cannot be categorised as insurance corporations or pension funds or public sector financial entities), can be used to obtain a conservative proxy of the size of the shadow banking system14 and its evolution over time.In order to cast the net wide, the macro-mapping needs to be conservative in nature, looking at all non-bank financial intermediation so as to cover all areas where shadow banking-related risks might potentially arise (for example through adaptation and mutations). This would alert the authorities to areas where adaptations and mutations could lead to points of risk in the system. Authorities could then conduct more detailed monitoring for policy purposes, with an eye towards identifying the subset of non-bank financial intermediation where there are (i) developments that increase systemic risk (in particular maturity/liquidity transformation, 11For Switzerland, end-2010 data were used for Other Financial Intermediaries.12Australia, France, India, Korea, Mexico, the Netherlands, the UK and the US submitted case studies on a voluntary basis.These were discussed at the AGV meeting on 17-18 July.13Some jurisdictions still lack Flow of Funds statistics, and have to use other data sources which may be less consistent.Even when Flow of Funds data are available, their granularity and definitions differs across jurisdictions and have been adjusted as necessary. In the October 2011 report, the FSB recommended that member jurisdictions improve the granularity of the Flow of Funds data, and expects the quality of its annual monitoring exercise to increase as a result of improvements in Flow of Funds statistics. This will also be supported by the international initiative to improve the Flow of Funds data under the IMF/FSB Data Gaps initiative based on recommendation 15 in the report by the IMF/FSB to the G20 on The financial crisis and information gaps, November 2009.14For example, see Pozsar et al. (2010) Shadow Banking, FRBNY Staff Reports, July, Bakk-Simon et al. (2012) Shadow Banking in the Euro Area: An Overview, ECB Occasional Paper Series, April, and Deloitte Centre for Financial Services (2012) The Deloitte Shadow Banking Index: Shedding light on banking’s shadows.imperfect credit risk transfer and/or leverage), and/or (ii) indications of regulatory arbitrage that is undermining the benefits of financial regulation (Exhibit 1-1).Measuring the shadow banking systemSimplified conceptual image Exhibit 1-12.Overview of macro-mapping resultsThe main results of the 2012 exercise at macro-mapping the shadow banking system can be briefly summarised as below:•Aggregating Flow of Funds data from 20 jurisdictions (Argentina, Australia, Brazil, Canada, Chile, China, Hong Kong, India, Indonesia, Japan, Korea, Mexico, Russia,Saudi Arabia, Singapore, South Africa, Switzerland, Turkey, UK and the US) and theeuro area data from the European Central Bank (ECB),assets in the shadowbanking system in a broad sense (or NBFIs, as conservatively proxied by financialassets of OFIs15) grew rapidly before the crisis, rising from $26 trillion in 2002 to$62 trillion in 2007. The total declined slightly to $59 trillion in 2008 but increasedsubsequently to reach $67 trillion in 2011 (Exhibit 2-1).•Expanding the coverage of the monitoring exercise has increased the global estimate for the size of the shadow banking system by some $5 to 6 trillion in aggregate,bringing the 2011 estimate from $60 trillion with last year’s narrow coverage to $67trillion with this year’s broader coverage. The newly included jurisdictions contributing most to this increase were Switzerland ($1.3 trillion), Hong Kong ($1.3trillion), Brazil ($1.0 trillion) and China ($0.4 trillion).15OFIs comprise of all financial institutions that are not classified as banks, insurance companies, pension funds, public financial institutions, or central banks.Total assets of financial intermediaries20 jurisdictions and euro area Exhibit 2-1Source: National flow of funds data.•The shadow banking system’s share of total financial intermediation has decreased since the onset of the crisis and has been recently stable at a level around 25% of thetotal financial system (Exhibit 2-2), after having peaked at 27% in 2007. Inaggregate, the size of the shadow banking system in a broad sense is around half thesize of banking system assets.Share of total financial assets20 jurisdictions and euro area Exhibit 2-2Source: National flow of funds data.•The size of the shadow banking system (or NBFIs), as conservatively proxied by assets of OFIs, was equivalent to 111% of GDP in aggregate for 20 jurisdictionsand the euro area at end-2011 (Exhibit 2-3), after having peaked at 128% of GDPin 2007.Assets of non-bank financial intermediaries20 jurisdictions and the euro area Exhibit 2-3Source: National Flow of Funds data.• The US has the largest shadow banking system, with assets of $23 trillion in2011 on this proxy measure, followed by the euro area ($22 trillion) and the UK ($9trillion). However, its share of the total shadow banking system for 20jurisdictions and the euro area has declined from 44% in 2005 to 35% in 2011 (Exhibit 2-4).16 The decline of the US share has been mirrored by an increase in theshares of the UK and the euro area.Share of assets of non-bank financial intermediaries 20 jurisdictions and euro areaExhibit 2-4Source: National flow of funds data.16 Changes in the national shares may also reflect shifts in exchange rates and changes in accounting treatments.These aggregates count as a conservative estimate of the size of the shadow banking system, across a number of dimensions. Firstly, the category “other financial intermediaries” may include entities that are not engaged in credit intermediation. The range of entities included in this category can vary from one jurisdiction to another. Secondly, “financial assets” include non-credit instruments that may constitute part of the long credit intermediation “chain”. Third, in some cases total assets are used rather than financial assets, because of data limitations.The remainder of this report examines the composition and growth of the shadow banking system in more detail.•Section 3 offers a more detailed cross-jurisdiction analysis of the size of the shadow banking system, and growth trends since the onset of the crisis. It shows aconsiderable divergence among jurisdictions in terms of: (i) the importance of NBFIs in the overall financial system (% share within the financial system); (ii)size relative to real economy (GDP); and (iii) growth trends, especially after thecrisis.Jurisdictions where NBFIs are large relative to the financial system and have experienced robust growth since 2007 may deserve more in-depth investigation (e.g.the UK). For emerging market and developing economies where the NBFI sector isgrowing at a strong pace but remains small overall, the challenge consists in strikingan appropriate balance between the need for increasing financial inclusion and broadening access to finance, including through NBFIs, and the importance ofpreserving financial stability.•Section 4 provides a detailed analysis of the components of the shadow banking system, as conservatively proxied by OFIs, and growth trends since the onset of thecrisis. Investment funds other than MMFs seem to constitute the largest share (35%of OFIs in 2011), followed by structured finance vehicles (10%). The size of all sub-sectors of OFIs is, on aggregate, either stable or declining since 2007, with the largest declines affecting MMFs and structured finance vehicles.•Thanks to improvements in the granularity of data provided by certain countries, the share of the unidentified component (“others”) within the OFI sector has beenreduced from 36% last year (with data from 11 jurisdictions) to 18% this year (withdata for 25 jurisdictions) and 33% (with data for 20 jurisdictions and the euro area).However, since other jurisdictions with a large shadow banking system (e.g. the euroarea and the UK) lack granular data for NBFIs, further improvement in the Flow ofFunds statistics or adjustments by other data sources is essential to obtain a betterpicture of this sector.•Systemic risks stemming from interconnectedness between banks and shadow banking entities are examined in Section 5. Among the various measures to capturesuch risks, (i) direct credit exposures and (ii) funding dependence across sectors areassessed based on data submitted from some jurisdictions. A cross-jurisdictioncomparison of jurisdictions where data is available shows that there is wide variationin the degree of interconnectedness between the two sectors in different financial systems. However, in most jurisdictions, interconnectedness risk tends to be higher for shadow banking entities than for banks. Shadow banking entities seem to be moredependent on bank funding and are more heavily invested in bank assets, than viceversa. This assessment may be improved with wider data coverage, more granulardata, and supplementing the assessment by additional information, for instance sourced from prudential regulators.•Finally, a brief summary of responses to the additional survey questionnaire on finance companies is set out in Section 6. The responses from 25 participating jurisdictions suggest the existence of a wide range of businesses covered under thecategory “finance companies”, a term that broadly refers to non-banks that provideloans to other entities. While the composition of this sector varies across jurisdictions, the responses underlined the importance of finance companies in providing credit to the real economy especially to fill credit voids that are notcovered by other financial institutions. A few jurisdictions have also emphasised theneed to enhance monitoring of the sector as finance companies may be liable to specific risk factors and/or regulatory arbitrage. However, since the size of the sectoris limited, participating jurisdictions do not see significant risks at present from asystemic point of view.3.Cross-jurisdiction analysisFlow of Funds data allow for cross-jurisdiction comparisons of the structure of financial systems and of the importance and growth of NBFIs as conservatively proxied by OFIs (see template in Annex 1).3.1Structure of financial systemsThree main groups of jurisdictions emerge when analysing the structure of financial systems based on the share of banks, insurance companies and pension funds, other NBFIs/OFIs, public financial institutions and central banks in the total (see Annex 2 and Exhibit 3-1): • A first group includes advanced economies characterised by a dominant share of banks combined with a limited share of OFIs that does not exceed 20%. Jurisdictionssuch as Australia, Canada, France, Germany, Japan, Spain fall in this category.• A second group includes economies where the share of OFIs is above 20% of the total financial system and relatively similar, or higher, to that of banks. For instance,the Netherlands, the UK, the US, fall in this category.• A third group includes emerging market and developing economies where the share of public financial institutions or the central bank is significant, often on account ofhigh foreign exchange reserves or sovereign wealth funds, and where the share ofOFIs is relatively low. This group includes jurisdictions such as Argentina17, China,Indonesia, Russia and Saudi Arabia.17In Argentina, foreign currency deposits constituted by the banks pursuant to liquidity regulations are included in the assets of the Central Bank. These regulations require banks to make foreign currency deposits at the Central Bank in compliance with requirements associated with their own obligations denominated in foreign currency.Three examples of different financial structuresShare of total assets by jurisdiction, in per cent Exhibit 3-1Source: National flow of funds data.Size of other financial intermediariesAs a percentage of GDP, by jurisdiction Exhibit 3-2AR = Argentina; AU = Australia; BR = Brazil; CA = Canada; CH = Switzerland; CL = Chile; CN = China; DE = Germany; ES = Spain; FR = France; HK = Hong Kong; ID = Indonesia; IN = India; IT = Italy; JP = Japan; KR = Korea; MX = Mexico; NL = Netherlands; RU = Russia; SA = Saudi Arabia; SG = Singapore; TR = Turkey; UK = United Kingdom; US = United States; XM = Euro area; ZA = South Africa.1 20 jurisdictions and euro area.Sources: National flow of funds data; IMF.Globally, the shadow banking system, as conservatively proxied by OFIs, represents on average 25% of financial system assets and 111% of the aggregated GDP, for the sample of 20 participating jurisdictions and the euro area. As shown in Exhibit 3-2, these aggregate numbers mask wide disparities between jurisdictions. Five jurisdictions (Hong Kong, the Netherlands, the UK, Singapore and Switzerland) are characterised by a large size of NBFIs relative to GDP, which is partly attributable to the fact that these countries also have large。

相关文档
最新文档