Tuesday, July 21, 2009

Dangers of Corporate Ego

Dangers of a corporate ego


The consequences for a company can be dire when highly confident executives fall victim to hubris. By Anthony Black.

When ego becomes a dirty word

Confidence is needed for success in business and in life. But the line that separates supreme confidence from an out-of-control ego can be crossed in an instant with devastating results.

Business school professor Mathew Hayward, of the University of Queensland points to the string of recent failures and historical corporate catastrophes to illustrate that measures of success often boil down to senior management ego.

He says hubris - excessive pride, presumption or arrogance is pervasive in the corporate world, 'It is quite difficult to find a business today that has not been materially damaged by out-of-control egos.'

The symptoms of raging ego, although numerous, are unremarkable. Simply getting caught up in one's own publicity is enough for a confident chief executive to cross Hayward's 'razor-thin line' and ruin the company. Luck can also get senior managers over the line.

Executive ego and hubris were clearly conspicuous when Hayward was working as an investment banker during the 'greed is good' decade of the 1980s. It was the corporate raider era, Hayward recalls, when company executives armed with almost limitless credit paid exorbitant premiums for overvalued assets.

In particular, he is referring to Bond Corporation's purchase of Australia's Nine Network from Kerry Packer for about A$1 billion in 1987, and the failure of debt laden firm Qintex directed by Christopher Skase. Packer's Publishing and Broadcasting Ltd (PBL) bought the Nine Network back from Alan Bond for about $250 million in 1990 amid the collapse of Bond Corporation.

Bond's access to credit and his America's Cup success in 1983 didn't necessarily qualify him to run a television network.

Hayward asks: 'What did Bond know about broadcasting, what did he know about television? But it didn't stop him buying Packer's network for an exorbitant price. It was classic hubris. Bond had no business buying Nine, or the amount he paid, and we all saw the end result.'

Skase was also way out of his depth. His multi-billion dollar spending spree included buying the Seven Network, and building fabulous Mirage holiday resorts in Queensland. Before his Qintex empire collapsed, Skase was particularly conspicuous, using a private jet and throwing lavish parties, all in front of the cameras.

Hayward says Skase's ego was well and truly out of control before he became a fugitive by fleeing to Majorca to avoid prosecution.

'If you look back at that time, a lot of high-flying businessmen were either convicted of criminal offences, died, went bankrupt or fled,' says Hayward. Some even went to jail.

US car industry bosses made headlines with their over confidence when, in November 2008, they flew to Washington in private jets to plead their case for billions of dollars in taxpayer-funded industry rescue packages.

Using private jets outraged Congress and the US nation to the point that the three car industry bosses returned to Washington a month later in hybrid cars. A lot has happened since then, including General Motors filing for bankruptcy and the resignation of the chairman and chief executive Rick

Wagoner, who presided over staggering multi-billion dollar losses in the past four years.

In an interview last year, Australian tyre magnate Bob Jane expressed outrage over the behaviour of US car bosses. Jane said General Motors, Ford and Chrysler LLC in the US are now paying the price for years of mismanagement, lack of vision and poor planning. He said rewarding executives with outrageous multi-million dollar salaries for poor performance, combined with car company bosses travelling on private jets to Washington, shows just how much they are out of touch with the real world.

'The three big car makers in the US clearly lost their way,' Jane said. 'Henry Ford would be turning in his grave over what has happened at Ford. The business fundamentals Henry Ford created have been discarded. Henry Ford hated to borrow money from banks. He made money from perfecting the assembly line.

'I have read his book My Life and Work many times. I live by his message of working hard and thinking smart, but it's been lost on US car makers.'

On the flip side, Hayward acknowledges the world is filled with top executives with enviable performance records in good and testing times. Packer, who long held the mantle of Australia's richest man before dying on 26 December 2005, served as a prime example of a successful businessman who could hold his ego in check, according to Hayward.

He recalls when Packer, in the 1980s and early 1990s, would never conduct a big merger or acquisition deal without the approval of his principal adviser James Wolfensohn, 'Prior to deal discussions, one party believed they would be dealing with Packer; no they'd be dealing with Wolfensohn,' Hayward says.

'Wolfensohn was a man of spectacularly good judgment. He kept Packer's ego under control.'

Wolfensohn would later become president of the World Bank between 1995 and 2005.

Global media mogul Rupert Murdoch is another example of someone with his feet firmly planted on the ground. 'Murdoch is fundamentally a journalist, a newspaper man,' Hayward says.

'Murdoch's seen the changes in the media industry and moved with the times. He's remained pretty true to his vision of building a global media empire after starting with one newspaper in Adelaide.'

Eighteen months into the worst global financial crisis since the Great Depression, shareholders can easily assess the performance of senior executives running their listed companies.

While most senior executives and their companies are weathering the storm, albeit with much lower share prices and market capitalisation, the global financial crisis (GFC) is showing no mercy to those who designed or pedalled flawed boardroom strategies. The GFC casualty list is growing daily with what Hayward calls 'big heads and fat cats.'

Hayward says it's almost natural for senior executives to be overly optimistic about the future - to provide a level of conviction to stakeholders.

After all, who wants to invest in a company with a subdued outlook? But as the global financial crisis is showing, a subdued, considered, careful and conservative outlook is undoubtedly preferable to an overly optimistic one built on too many assumptions.

'The challenge is to understate forecasts in difficult times,' Hayward says. He says it's best for companies to take their medicine early when it becomes clear that a projection is going to miss the mark. Then everyone knows the score. 'Take a hit if the value of an asset has fallen, otherwise it's just delaying the inevitable.'

Executive hubris not only affects company performance, but also perceived future performance projections. Forecasting is difficult at the best of times, but overestimating company prospects is akin to setting up stakeholders for disappointment.

Hayward says Lehman Brothers in the US posted a record earnings report 12 months before the investment bank failed. The global financial crisis cut a swathe through company projections that made one question the competence of senior executives. Projected and actual earnings of many financial institutions had no correlation when the real value of sub-prime assets emerged.

Hayward would like to see auditors play an integral role in company projections as a safeguard against senior management being too optimistic. Call it checks and balances on behalf of stakeholders. But Hayward acknowledges that such an initiative would meet stiff resistance on several fronts, particularly from managers. who perceive auditors as being removed from the daily running of the business.

But Hayward says it's a concept deserving of serious consideration from company boards across the world, particularly in light of the company carnage during the global financial crisis. 'I would like to see auditors reviewing the veracity of projections.' Hayward says.

Hayward says a company projection model used by Michael Chaney when he was chief executive of industrial conglomerate Wesfarmers has merit. Hayward argues that under this model, a senior divisional manager was likely to get more funding after producing a 17 per cent return or more on capital employed during the past 12 months.

A manager would be eligible for new funding after proving a return of between 10 and 17 per cent on existing capital, while returns below 10 per cent on capital put an existing operation in jeopardy, with little hope of new funding

'This model tries to remove projections from the decision-making process,' Hayward says. 'It's based on data.'

Raw and recent data is what counts with Hayward as opposed to what 'might be'.

Hayward says senior managers of small-to-medium sized companies face the same ego and hubris challenges as their listed counterparts. Poor and reckless decisions made by a partner whose ego is out of control can ruin a firm.

Ego has for so long fascinated Hayward that he wrote a book on the subject, Ego check: Why executive hubris is wrecking companies and careers and how to avoid the trap in 2007, before the emergence of the global financial crisis. He says his fascination with the topic began in the 1980s when working as an investment banker and a venture capital investor in Australia.

Advising high-profile CEOs on mergers and acquisitions enabled him to see first hand the damaging effects of executive hubris.

He is now working on a follow-up book, Get real: Facing up to the truth in business. Hayward says his new book will focus on 'straight talking' as a solution to the ego problem that infects chief executives and senior managers across the globe.

Hayward says Asian executives are widely respected, almost worshiped for the positions they hold so they are also susceptible to losing control of their egos. Asian firms are extremely powerful and chief executives attract a lot of press as the public face of their companies.

'What I am trying to do is get business to institute a process for checking egos before making decisions,' he says. 'It's often difficult for senior management to admit they may lack the capability to handle a transaction, and it's something that in general we humans have to work very hard at as we are very prone to self-enhancing behaviours.

But in the end, if you're going to have a successful career and life, you are also going to have to learn how to check your ego.'

Senior executives who acknowledge their limitations and shortcomings are acting in the best interests of the company. They seek the best advice on solving a problem rather than attempting a 'quick fix' that may or may not work. Smart executives know when a problem is beyond their expertise. Importantly, they are not insecure and welcome advice from other parties because they don't feel caged in, impeded or threatened.

They are able to step outside their comfort zone, and the end result is invariably better for the company, according to Hayward. He says senior executives with an open mind to alternative views and solutions are confident managers - they trust their own judgment and the proven abilities of others.

The entire company doesn't revolve around the activities of one person. Supreme confidence, kept in check, is a welcome, rewarding and reassuring quality.

'After all, you want the surgeon who is performing your operation to be confident,' Hayward says

Source: CPA Australia.

Sunday, July 19, 2009

The dirty secrets of financial planners

The financial planning industry has a series of dirty little secrets that make investment banks look like paragons of virtue. And that's pretty hard to do in this day and age.

Dirty little secret #1

Many financial planners work to sales targets. For these planners the need to increase revenues is included in financial planners' key performance indicators or in their job descriptions.

Have you experienced any tricks of the trade employed by financial planners? Have your say

In some cases these targets may be a figure - say $55,000 in revenue generated a quarter, breaking down to roughly $7000 a week. The way a planner gets to these targets is not by selling advice; it is by selling products with up-front fees and commissions.

Dirty little secret #2

Some banks' financial planners are ranked in "league tables'' based on who sells the most. This little secret blows away any thoughts that Joe Blow planner is a disinterested adviser.

If major planning groups keep and internally publish league tables on how their financial planners are performing in terms of "sales'' it is hard to see a workforce being motivated to offer impartial financial advice. It cements the above-mentioned industry bias towards sales people rather than advisers.

Dirty little secret #3

In the boom years, a planner on a $60,000 salary could earn up to $70,000 on top of that in commission-based payments.

Yes, we have heard a lot about commissions. Yes, we hear that commissions can lead financial planners to offer products they may not actually believe in.

But I wonder whether we fully understand that a planner regularly offering investors advice that is not attached to some form of commission are flirting with half their likely annual salary.

Dirty little secret #4

You can't go outside the system. I have spoken to two planners who left big planning groups because they felt they were unable to offer the advice they were required to (that is, sell more stuff) rather than the advice they felt they should professionally offer people (for example, go into a term deposit).

In both cases the planners say they were counselled about their perceived failure to convert existing clients into lucrative purchasers of commission-based products.

Dirty little secret #5

Churning = earning. A planner looking to lift earnings can simply recommend new clients switch from one superannuation fund to another. While this bumps the revenue up nicely for the planner, it has some particularly nasty consequences for the unwitting client.

One, they may lose the life insurance contained in the original industry superannuation. Two, if the planner offers a substitute insurance policy they frequently get the handsome up-front commissions on the new product (which are effectively paid for by the customer any way.)

While I freely accept there are honest, committed and sincere financial planners, they are currently caught in an industry structure so tangled that it's hard to pick the good from the bad.

And before those honest planners start crying foul about unfair generalisations (a big thanks to the planner who sent the e-mail with the subject line "Scummy journalism'' in response to a previous column), it's worth remembering that everything written above is based on criticism levelled by other financial planners.

These are not practices that appear in submissions made to the Corporations and Financial Services parliamentary committee currently charged with implementing change.

But it is worth spelling them out in some detail because they are practices that have threatened the integrity of the industry as a whole.

Both the industry and the parliamentary committee need to understand these practices and how they developed to fully comprehend the need for change. Let's hope they then make changes that put the industry on a completely new footing.

Source : The Sydney Morning Herald; By Sam Washington

Friday, July 17, 2009

It’s illegal for vendors to collect credit card nos

Have you ever handed your credit card at a retail cash counter and noticed the executive jot down your 16-digit card number? If you have, the practice is illegal.
Drawing attention to it, S K Virmani, project manager at the Delhibased National Consumer Helpline, a project supported by the ministry of consumer affairs, says certain shopping outlets—not just local grocers, but even a few large retailers—collect customers’ card numbers. They supposedly store the numbers in their databank to recall them in a dispute, says Virmani, although all transaction details automatically get generated at the bank’s end.
“In my view,” says Virmani, “this is an unethical practice as it is not secure. Accordingly, the issue was escalated by NCH with credit-card issuers as well as merchants.” Virmani illustrates the security threat with an example. Suppose you buy a television set. Now, you would anyway list out your particulars for the warranty card, like your name, address and mobile number. Along with your card number, a lot of your sensitive information would be out there in the open.

Sanjeev Talwar, also of NCH, says the data could be misused for online transactions, which so far require the 16-digit card number and the three-digit card security (CVV) code.
It could be misused in other ways too. A senior Mumbai banker adds that the database could be sold to marketing agencies looking for consumer history. “Some agencies may collect (consumer) footprints. It could be useful for marketing research,” says the banker. All this, without the consumer’s knowledge, leave alone consent.
K Unnikrishnan, deputy CEO at the Indian Banks’ Association, says that earlier when one’s card was swiped on the point-of-sale machine, the printout generated would display the entire 16-digit number.
After online shopping took off, the printout started displaying just the last four digits of the card number as a security measure. “The 16-digit code is difficult to memorise,” says Unnikrishnan.
Senior Delhi and Mumbai bankers and a banking ombudsman official TOI spoke to, confirm that no retail outlet can ask for card details. Even card-issuing banks themselves are disallowed from sharing customer data collected for know your customer or KYC purpose.
RBI’s master circular on credit card operations of banks issued on July 1, 2009, specifies, “The card-issuing bank/NBFC should not reveal any information relating to customers obtained at the time of opening the account or issuing the credit card to any other person or organisation without obtaining their specific consent…”

Source: Times of India, Mumbai Edition

Wednesday, July 15, 2009

E-Commerce Industry Opposes New Indian Online Security Rules

A decision by India's central bank to mandate another level of authentication for card use for online transactions will deter such transactions in the country, according to an association of India's e-commerce industry.

A decision by India's central bank to mandate another level of authentication for card use for online transactions will deter such transactions in the country, according to an association of India's e-commerce industry.

The Reserve Bank of India (RBI) told banks in February that it would require that online credit and debit card transactions have an additional level of authentication using information that is not visible on the card. The new rules come into force on Aug. 1.

To make a transaction, a user is currently required to enter his name, card number, card expiry date and card verification value (CVV), the three digits printed on the signature strip on the back of the card.

Click here to find out more!

Banks are also required to have a system of online alerts to the card holder for online card transactions for a value of 5,000 Indian rupees (US$102) or above, the RBI said.

The addition of a new security password will add a new layer of complexity for people wanting to do business online, Mehul Gupta, associate vice president of IAMAI (Internet & Mobile Association of India) said on Wednesday.

Card holders have not been informed by their banks about the requirement for another level of authentication, which will lead to fewer transactions getting completed online once the new rules come into force, Gupta said.

Customers are already finding it difficult to complete transactions, because of the poor Internet connectivity in India, and the inadequate infrastructure of payment gateways, IAMAI said in a paper.

Additional authentication requirements will result in a high failure rate of transactions, and increase customer inconvenience, IAMAI added.

Online card fraud accounts for only 0.16 percent of the country's 92 billion rupees e-commerce industry in India, according to IAMAI estimates.

Most of that fraud is through cards that were not issued in India, and which are not covered under the new rules, Gupta said.

IAMAI has asked the RBI to delay implementation of its order, to give time to merchants and banks to improve their capabilities to handle the new authentication mechanism, and also to give customers sufficient time to get acquainted with it.

"Online card fraud, given its current miniscule scale, should ideally be seen as a business risk that merchants are free to take or not to take," IAMAI said. In the e-commerce environment in India, the risk arising from non-payment or fraud is borne by the merchant site and not the banks or the card companies, it added.

Source : www.CIO.com ; By John Riberio

Tuesday, July 14, 2009

MORTGAGE FRAUD SCAM - 'Dream Homes' Turns into Nightmare

The company had all the trappings of success—its top officials lived lavish lifestyles, kept a fleet of chauffeur-driven cars, and donated generously to charities. And it used slick marketing to sell its “Dream Homes Program,” which promised to pay homeowners’ mortgages in return for an up-front fee that would be invested in profitable business ventures.

But the dream turned into a $70 million nightmare for more than a thousand investors—among the latest victims of mortgage fraud.

The five people behind Metro Dream Homes and the bogus mortgage payment program were actually running an elaborate deception—one eventually unraveled through the cooperative efforts of federal and state law enforcement agencies.

“The effects of this wide-ranging mortgage fraud scheme are particularly disturbing against the backdrop of today’s economic environment,” said Thomas J. Harrington, Executive Assistant Director of our Criminal, Cyber, Response, and Services Branch.

Here’s how the scam worked:

  • Between 2005 and 2007, victims were persuaded into investing at least $50,000 with Metro Dream Homes, either by refinancing their existing homes or buying new homes at inflated prices.
  • Investors were told not to worry about high mortgages because Metro Dream Homes would pay their future monthly payments and pay off their mortgages within five to seven years using returns on the homeowner’s original investment. Then the homeowner and Metro Dream Homes would own an equal interest in the home.
  • Victims were told that their $50,000—not including an administrative fee of up to $5,000—would be used to fund investments in automated teller machines, flat-screen TV displays that carried commercial advertisements, and Touch-N-Buy electronic kiosks that sold telephone calling cards and other items.
  • To make the scam seem more legitimate, the company marketed its program through live presentations at posh hotels in Washington, D.C.; Baltimore; and even Beverly Hills, California.

In the end, it was a classic Ponzi scheme: the proceeds from later investors went to pay the mortgages of earlier investors. The ATM machines, flat-screen TVs, and electronic kiosks never generated any meaningful revenue, federal prosecutors contend.

And the bulk of the money? It lined the defendants’ pockets—with $200,000-a-year salaries, luxury cars, and travel to major sporting events like the 2007 Super Bowl.

By the time law enforcement shut down the company, homeowners had already invested about $70 million. When Metro Dream Homes stopped making the mortgage payments, the homeowners were left holding the bag. The defendants, meanwhile, are facing long prison terms for multiple counts of fraud, conspiracy to commit money laundering, and other charges.

At a press conference today at the Department of Justice to announce the indictments, Harrington said that to combat the recent “exponential rise in mortgage fraud investigations,” the FBI has increased the number of agents who investigate mortgage fraud from 120 in 2007 to more 250 today. We participate in 18 mortgage fraud task forces and 47 working groups across the country.

“One of the best tools the FBI has in its arsenal for combating mortgage fraud,” he said, “is its long-standing partnerships with other federal, state, and local law enforcement.”

Source: www.fbi.gov

Sunday, July 12, 2009

$65 Billion Stolen by Madoff? Hardly

Well-meaning victims, courts, the media and the public actually believe that Bernard Madoff, sentenced recently to a record 150 years in prison, stole $65 billion. Chances are that’s not even close.

What has been lost in the hysteria of the largest fraud in history is that the lion’s share of that money doubtlessly went to investors who did not show up in court to demand Madoff’s maximum punishment. Why would they? They’re laughing all the way to the bank because these investors were paid off early in the Ponzi scheme.

The principle characteristic of a Ponzi scheme is that earlier investors are paid with money from later ones. That is what the notorious Carlo Ponzi did in the 1920s by promising investors that they would double their money in 90 days — an effective interest rate of 360 percent when banks were paying about 2 percent on savings accounts. As long as new investors joined earlier ones, the scheme could continue. But all such scams are pre-destined to fail because of pyramidal mathematics.

Assume six investors put money into a seemingly legitimate (but fraudulent) investment. They become the Ponzi’s best advertisement and will tell their friends who will tell their friends. (Remember: Madoff didn’t advertise; he didn’t have to.) If the scheme grows exponentially ad infinitum, by the eighth iteration, the number of investors has exceeded the population of the United States. By the 13th level, they exceed the total people of Planet Earth.

Make no mistake: Bernard Madoff did not come forward because of a guilty conscience. With the downturn in the economy, he did the math and realized his swindle could not be sustained. It takes tremendous cash to operate a Ponzi scheme. In most fraud cases, like this one, the actual losses will probably never be known.

Still, Madoff — with multiple million-dollar mansions, a yacht and all of his other trappings — probably didn’t convert more than a billion dollars of illegal loot to his own purposes. What hasn’t been made clear is that fraud is unique in criminal offenses: It is the only one that requires voluntary assistance from the victim. And the reason most people fall victim to fraud can be described in one word: ignorance.

There is no amount of punishment that can restore victims of crime. Executing a killer doesn’t bring a victim of murder back to the living; 30 years in prison for a rapist does not restore the lost innocence of his victim.

Four decades of my life’s work has been in the anti-fraud field and the study of white-collar crime and punishment. First I was an FBI agent specializing in fraud cases. Now I am chair of the Association of Certified Fraud Examiners. With nearly 50,000 members in 125 countries, we are the world’s largest anti-fraud organization. People who know me are aware that I am not soft on crime.

But today I received an e-mail from someone who wasn’t even a victim of Madoff. Yet he “…prefer[s] the Chinese method of dealing with white-collar criminals. At least they can recoup some money by selling their organs. Harvested organs bring a really good price. 150 years in jail. Madoff got off easy. His wife should be penniless and homeless if we can’t convict her as an accomplice.” That isn’t logic talking; it’s pure rage. This person would deny the constitutional right of due process to someone who has not yet been charged with or convicted of a crime. Regrettably, too many others feel the same way.

Prosecutors and politicians often say that harsh punishment sends a message to deter others. However, reams of scientific criminological studies cast serious doubt on this dubious notion, called “general deterrence.” What deters crime — of any kind — is the dread of being caught; if someone has no fear of detection, the potential punishment is moot.

If we got serious about avoiding future Madoffs, we would get him — from prison — to educate others on exactly how he was able to pull off such a massive deception for decades so that we all could learn from this fiendish mastermind. It is impossible to defraud a victim who knows what to look for. After all, Madoff whistleblower Harry Markopolos, a certified fraud examiner, wasn’t fooled. Education is by far the best prevention for fraud.

Joseph T. Wells, CFE, CPA, is founder and chairman of the Association of Certified Fraud Examiners. He has published 14 books and nearly 200 articles on fraud education.

Employee Fraud And Misconduct

The recession has brought more than just layoffs and losses; it is increasing employee fraud and misconduct.

Here's what you can do about it.

As senior management teams have focused on reevaluating 2009 by restructuring departments and business units, and in many cases dramatically reducing the size of the company, employees have increasingly become cynical about the ethical culture of the typical corporation. That cynicism has translated directly into a lack of respect for the company and its rules and a rise in fraud and misconduct.

Based on a survey of more than 125,000 employees in 75 countries over the past five quarters, the Corporate Executive Board has seen startling trends in this area, including:


• A 20% increase in observations of misconduct from the first to the second half of 2008;

• A 5% decline in frontline employee perceptions of senior management's commitment to integrity;

• And an increase in the number of disengaged employees, from one in ten to one in five, causing declines in companywide productivity of up to 5%.


Moreover, the Corporate Executive Board's research shows that business units with the weakest cultures have experienced five times the amount of misconduct as those with the best. In other words, when employees perceive a weak ethical culture, misconduct significantly rises.

How can executives restore a culture of integrity? The key to corporate integrity and reduced misconduct is "organizational justice"—or the belief among employees that the company will not tolerate unethical behavior and that management will respond quickly and consistently to unethical behavior when it occurs. When employees believe their company has strong organizational justice, the company's overall commitment to integrity rises and misconduct drops.

To create a culture of organizational justice, companies should start by following these three simple guidelines:

• Equip managers to deal decisively and consistently with instances of misconduct or unethical behavior;

• Show the whole employee population—using real instances from the company—how the company deals with misconduct; and

• Close the loop with employees who report misconduct, so they know that appropriate actions were taken.

Source: BusinessWeek, By The Staff of Executive Board.

Thursday, July 9, 2009

Ethics 'should be taught' to accountants

ACCOUNTANTS are under growing pressure from within their ranks to improve their ethical standards, after corporate collapses that have dragged the profession's reputation through the mud.

The director of the Accounting Professional and Ethical Standards Board, Jack Flanagan, has reignited a debate on whether studying ethics should be compulsory in accounting degrees, after finding many courses only pay lip services to moral issues.

In a conference paper presented this week, Professor Flanagan said collapses such as Allco Finance Group, Babcock & Brown and ABC Learning put the focus squarely on accounting ethics. "This series of events has prompted some in the accounting profession to question the current state of ethics education," he said.

Professor Flanagan said courses were biased towards technical training, which risked leaving young accountants ill-equipped to deal with ethical dilemmas. "Ethics shouldn't be an add-on to accounting and auditing education but a fundamental element of it as it informs all professional action," he said.

The paper also quoted a survey which found a "large minority" of third-year accounting students admitted to stealing, cheating in exams, compromising personal ethics at work, and falsifying work expenses.

The peak body, CPA Australia, was reluctant to concede any shortfall in ethical standards, but said more focus on the issue would be worthwhile.

The general manager of professional standards at CPA, Denis Pratt, agreed there was a need for ethical training to be more closely integrated with technical work.

"I think [it's] a valid point … in the suggestion that there should be more of a view that ethics is central and fundamental in running a business," he said.

The global financial crisis has highlighted the huge ethical dilemmas facing accountants. Most glaringly, accountants and auditors are expected to rigorously scrutinise all accounts, but also depend on corporate clients for their pay.

An analyst at the corporate governance consultancy RiskMetrics, Martin Lawrence, said whistle-blowing in the profession was rare. He knew of only one auditor in 20 years to resign over a disagreement management.

"The central problem is that auditors are expected to bite the hand that feeds them," Mr Lawrence said.

As well as calls for more emphasis on ethics, the Federal Government is probing the conflicts of interest in commissions paid to financial advisers, many of whom are accountants.

However, addressing conflicts of interest through training may prove difficult, as sceptics say peoples' moral compass comes as much from upbringing and family as education.

"I'm not sure how well you can actually teach ethics," Mr Lawrence said.


Source: The Sydney Morning Herald; By Clancy Yeates

UPDATE: New E-Scams & Warnings

FRAUDSTERS CONTINUE TO EXPLOIT TELECOMMUNICATIONS RELAY SERVICES (TRS)

07/08/09—The IC3 continues to receive complaints pertaining to scam artists using Telecommunications Relay Services (TRS) to defraud U.S. businesses and consumers. Under Title IV of the Americans with Disabilities Act, all telephone companies must provide TRS for individuals with hearing impairments or speech impairments.

This IC3 alert is to make the public aware of the continuing abuse of TRS to exploit U.S. businesses. Recent reports indicate scam artists are using TRS to exploit auto repair shops. The scam entails the fraudster using TRS to request services for a vehicle. The fraudster claims the vehicle has to be shipped to the auto repair business and requests the repairs and shipping fees be charged to a credit card. Unbeknownst to the business, the credit card is fraudulent or stolen; however, the charges initially go through without any complications. The business is then directed to wire the money to the shipper to cover the shipping costs. It is not until the shipper’s money is wired that the business is notified of the fraudulent credit card; therefore, the business bears the loss.

ASIAN EXTORTION SCHEME

06/10/09—The FBI is currently aware of a nationwide attempt to extort ethnic business owners, mostly of Asian decent, through telephonic threats of violence. The telephone calls appear to be originating from foreign countries. The caller acquires an adequate amount of open source information about the victim through Internet searches. This misleads the victim into believing the subject has personal knowledge about the victim. There have been no reported incidents of violence actually perpetrated to date.

SCHEME PURPORTEDLY ANNOUNCING A MILLIONAIRE CONTEST

04/07/09—The IC3 has been alerted to the circulation of a fraudulent e-mail, purportedly from The Oprah Winfrey Show, notifying recipients of their nomination for the “Oprah Millionaire Contest Show.” To participate, recipients are requested to mail their contact information such as full name, address, telephone number, and e-mail address; however, no mailing address was provided. Verified contestants are then required to purchase airfare and a ticket to attend The Oprah Winfrey Show, as well as complete a forthcoming contest form containing personal questions. The contestants are then promised a seat for The Oprah Winfrey Show in April and asked to provide their responses to the personal questions for a chance to win a million dollars.

Consumers always need to be alert to unsolicited e-mails. Do not open unsolicited e-mails or click on any embedded links, as they may contain viruses or malware. Providing your personally identifiable information will compromise your identity!

FAKE MILITARY TWIST ON VEHICLE SALE SCAMS

03/05/09—The FBI continues to receive reports of individuals victimized while attempting to purchase vehicles via the Internet. Victims find attractively priced vehicles advertised at different Internet classified ad sites. Most of the scams include some type of third-party vehicle protection program to ensure a safe transaction. After receiving convincing e-mails from the phony vehicle protection program, the victims are directed to send either the full payment, or a percentage of the payment, to the third-party agent via a wire payment service. No vehicles are delivered to the victims.

In a new twist, scammers are posing as members of the United States military. The fictitious military personnel in the scam have either been sent to a foreign country to improve military relations, or they need to sell a vehicle quickly and cheaply because of their upcoming deployment to either Iraq or Afghanistan.

Consumers are advised to do as much due diligence as possible before engaging in transactions to purchase vehicles advertised online. Consumers are also cautioned to be aware of the rules of or warnings posted by the Internet sites they visit. If someone is asking you as a consumer to break or avoid the rules of the website, it is possible that person is trying to scam you.

WORK-AT-HOME SCAMS

02/04/09—Consumers need to be vigilant when seeking employment online. The IC3 continues to receive numerous complaints from individuals who have fallen victim to work-at-home scams.

Victims are often hired to “process payments,” “transfer funds,” or “reship products.” These job scams involve the victims receiving and cashing fraudulent checks, transferring illegally obtained funds for the criminals, or receiving stolen merchandise and shipping it to the criminals.

Other victims sign up to be a “mystery shopper,” receiving fraudulent checks with instructions to cash the checks and wire the funds to “test” a company’s services. Victims are told they will be compensated with a portion of the merchandise or funds.

Work-at-home schemes attract otherwise innocent individuals, causing them to become part of criminal schemes without realizing they are engaging in illegal behavior.

Job scams often provide criminals the opportunity to commit identity theft when victims provide their personal information, sometimes even bank account information, to their potential “employer.” The criminal/employer can then use the victim’s information to open credit cards, post on-line auctions, register websites, etc., in the victim’s name to commit additional crimes.

NEW TECHNIQUE UTILIZING PRIVATE BRANCH EXCHANGE (PBX) SYSTEMS TO CONDUCT VISHING ATTACKS

12/09/08—The FBI has received information concerning a new technique used to conduct vishing (1) attacks. The recent attacks were conducted by hackers exploiting a security vulnerability in Asterisk software. Asterisk is free and widely used software developed to integrate PBX (2) systems with Voice over Internet Protocol (VoIP) digital Internet voice calling services; however, early versions of the Asterisk software are known to have a vulnerability. The vulnerability can be exploited by cyber criminals to use the system as an auto dialer, generating thousands of vishing telephone calls to consumers within one hour.

The vulnerability referred to in this alert is a known vulnerability. Digium, the original creator and primary developer of Asterisk, released a Security Advisory, AST-2008-003, in March of 2008, which contains the information necessary for users to configure a system, patch the software, or upgrade the software to protect against this vulnerability.

If a consumer falls victim to this exploit, their personally identifiable information (PII) will be compromised. To prevent further loss of consumers’ PII and to reduce the spread of this new technique, it is imperative that businesses using Asterisk upgrade their software to a version that has had the vulnerability fixed.

Further, consumers should not release personal information in response to unsolicited telephone calls. Providing your PII will compromise your identity!

(1) Vishing utilizes caller ID spoofing via VoIP to contact potential victims in order to gain access to their PII by convincing the victim that the criminal is associated with a legitimate business with a need to know the victim’s PII.

(2) PBX Systems are used by companies to allow telephone calls between VoIP enterprise users on local lines while allowing all users to share a limited number of external lines

HIT MAN E-MAIL SCAM RETURNS

08/28/08—The IC3 continues to receive thousands of reports concerning the hit man e-mail scheme. The e-mail content has evolved since late 2006; however, the messages remain similar in nature, claiming the sender has been hired to kill the recipient.

Two new versions of the scheme began appearing in July 2008. One instructed the recipient to contact a telephone number contained in the e-mail and the other claimed the recipient or a “loved one” was going to be kidnapped unless a ransom was paid. Recipients of the kidnapping threat were told to respond via e-mail within 48 hours. The sender was to provide the location of the wire transfer five minutes before the deadline and was threatened with bodily harm if the ransom was not received within 30 minutes of the time frame given. The recipients’ personally identifiable information (PII) was included in the e-mail to promote the appearance that the sender actually knew the recipient and their location.

Perpetrators of Internet crimes often use fictitious names, addresses, telephone numbers, and threats or warnings regarding the failure to comply to further their schemes.

In some instances, the use of names, titles, addresses, and telephone numbers of government officials and business executives, and/or the victims’ PII are used in an attempt to make the fraud appear more authentic.

Below are links for the two previous public service announcements published by the IC3 concerning the hit man scheme:

Consumers always need to be alert to unsolicited e-mails. Do not open unsolicited e-mails or click on any embedded links, as they may contain viruses or malware. Providing your PII will compromise your identity!

STORM WORM VIRUS

07/30/08—Be on the lookout for spam e-mail spreading malicious software (malware) which mentions “F.B.I. vs. facebook.” The e-mail directs the recipient to click on a link to view an article about the FBI and Facebook. Once the user clicks on the link, the “Storm Worm”malware is downloaded to the Internet-connected device, causing it to become infected with the virus and part of the Storm Worm botnet. A botnet is a network of compromised machines under the control of a single user. Botnets are typically set up to facilitate criminal activity such as spam e-mail, identity theft, denial of service attacks, and spreading malware to other machines on the Internet.

The Storm Worm virus has capitalized on various holidays and fictitious world events in the last year by sending millions of e-mails advertising an e-card link within the text of the spam e-mail.

Be wary of any e-mail received from an unknown sender. Do not open any unsolicited e-mail and do not click on any links provided.

TIPS ON AVOIDING FRAUDULENT CHARITABLE CONTRIBUTION SCHEMES

07/08/08—Since late May and early June 2008, there have been several natural disasters throughout the country—including tornadoes, wildfires, and floods—that have devastated lives and property. In the wake of these events, which cause emotional distress and great financial loss to numerous victims, individuals across the nation often feel a desire to help, frequently through monetary donations.

Tragic incidents such as 9/11, Hurricanes Katrina and Rita, and the recent earthquake in China have prompted individuals with criminal intent to solicit contributions purportedly for a charitable organization and/or a good cause. Therefore, before making a donation of any kind, consumers should adhere to certain guidelines, to include the following:

  • Do not respond to unsolicited (spam) e-mail.
  • Be skeptical of individuals representing themselves as officials soliciting via e-mail for donations.
  • Do not click on links contained within an unsolicited e-mail.
  • Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses. Only open attachments from known senders.
  • To ensure contributions are received and used for intended purposes, make contributions directly to known organizations rather than relying on others to make the donation on your behalf.
  • Validate the legitimacy of the organization by directly accessing the recognized charity or aid organization's website rather than following an alleged link to the site.
  • Attempt to verify the legitimacy of the non-profit status of the organization by using various Internet-based resources, which also may assist in confirming the actual existence of the organization.
  • Do not provide personal or financial information to anyone who solicits contributions: providing such information may compromise your identity and make you vulnerable to identity theft.

    PHISHING RELATED TO ISSUANCE OF ECONOMIC STIMULUS CHECKS

    05/08/08—The FBI warns consumers of recently reported spam e-mail purportedly from the Internal Revenue Service (IRS) which is actually an attempt to steal consumer information. The e-mail advises the recipient that direct deposit is the fastest and easiest way to receive their economic stimulus tax rebate. The message contains a hyperlink to a fraudulent form which requests the recipient's personally identifiable information, including bank account information. To convince consumers to reply, the e-mail warns that a failure to complete the form in a timely manner will delay the issuance of the rebate check.

    One example of this IRS spam e-mail message is as follows:

    "Over 130 million Americans will receive refunds as part of President Bush's program to jumpstart the economy.

    Our records indicate that you are qualified to receive the 2008 Economic Stimulus Refund.

    The fastest and easiest way to receive your refund is by direct deposit to your checking/savings account.

    Please follow the link and fill out the form and submit before May 10th, 2008 to ensure that your refund will be processed as soon as possible.

    Submitting your form on May 10th, 2008 or later means that your refund will be delayed due to the volume of requests we anticipate for the Economic Stimulus Refund.

    To access Economic Stimulus refund, please click here."

    Consumers are advised that the IRS does not initiate taxpayer communications via e-mail. In addition, the IRS does not request detailed personal information via e-mail or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts.

    Please be cautious of unsolicited e-mails. It is recommended not to open e-mails from unknown senders because they often contain viruses or other malicious software. It is also recommended to avoid clicking links in e-mails received from unknown senders as this is a popular method of directing victims to phishing websites.

    VISHING ATTACKS INCREASE

    01/17/08—Are you one of many who have received an e-mail, text message, or telephone call, supposedly from your credit card/debit card company directing you to contact a telephone number to re-activate your card due to a security issue? The IC3 has received multiple reports of different variations of this scheme known as "vishing". These attacks against US financial institutions and consumers continue to rise at an alarming rate.

    Vishing operates like phishing by persuading consumers to divulge their Personally Identifiable Information (PII), claiming their account was suspended, deactivated, or terminated. Recipients are directed to contact their bank via a telephone number provided in the e-mail or by an automated recording. Upon calling the telephone number, the recipient is greeted with "Welcome to the bank of ……" and then requested to enter their card number in order to resolve a pending security issue.

    For authenticity, some fraudulent e-mails claim the bank would never contact customers to obtain their PII by any means, including e-mail, mail, or instant messenger. These e-mails further warn recipients not to provide sensitive information when requested in an e-mail and not to click on embedded links, claiming they could contain "malicious software aimed at capturing login credentials."

    Please beware—spam e-mails may actually contain malicious code (malware) which can harm your computer. Do not open any unsolicited e-mail and do not click on any links provided.

    A new version recently reported involves the sending of text messages to cell phones claiming the recipient's on-line bank account has expired. The message instructs the recipient to renew their on-line bank account by using the link provided.

    Due to rapidly evolving criminal methodologies, it is impossible to include every scenario. Therefore, be cognizant and protect your PII. Beware of e-mails, telephone calls, or text messages requesting your PII.

    If you have a question concerning your account or credit/debit card, you should contact your bank using a telephone number obtained independently, such as from your statement, a telephone book, or other independent means.

    Source: www.fbi.gov.