62
Handout 02 – Managerial Ethics - Module – 01A: The Ethics of Market Abuse: Fraud, Corruption and Bribery Fr. Oswald A. J. Mascarenhas S.J., Ph.D. JRD Tata Chair Professor of Executive Ethics, XLRI, Jamshedpur July 10, 2014 Case 2.1: The Enron Corporate Fraud Incorporated in 1930 and re-incorporated in 1997, Enron, a multinational company that specializes in electricity, natural gas and energy markets and other physical commodities, was re-established in 1985 from the merger of Houston Natural Gas and Inter North of Omaha, Nebraska. In the year 2000, Enron employed 61,000, operated in over 40 countries, and reported revenues of $101 billion, thus wining the seventh rank among Fortune 500 that year. By October 2000, however, Enron became the pioneer and trendsetter of energy sector corporate aggressive accounting and insider trading irregularities. Among accounting scandals were the numerous “round-trips” it engaged in, and which soon became the industry “norm” for similar scams. For instance, Denver-based Qwest Communications used bandwidth to manufacture illusory revenue streams in its recent deal with Enron. According to investigators, Qwest agreed to pay Enron $308 million for the use of “dark fiber” (or unused fiber optic) capacity. In exchange, Enron agreed to pay Qwest between $86-195 million for access to active sections of Qwest’s network. Both deals turned out to be fake allowing both companies to record fat revenues for the period, and particularly helping Enron avoid reporting a loss for that period (Pizzo, 2002). Andrew Fastow, a Harvard Business School graduate and chief financial officer (CFO) at Enron, wore two hats. As CFO, he negotiated and set up outside partnerships to conduct Enron business. As the principal in these partnerships, however, Fastow also negotiated with Enron on behalf of the partnerships. This is obviously conflict of interest: which entity did Fastow favor in these deals? Enron’s policies prohibited employees from wearing two hats, but Enron’s Board of Directors exempted Fastow from this rule. The result was a series of money-losing transactions for Enron, and consequently, Enron’s stockholders, creditors and employees all emerged as heavy losers. A series of fake transactions between Enron and investment partnerships executed by Andrew Fastow, led to its filing for Chapter 11 bankruptcy protection in June 2001. In October 2001 Enron was suspected of a massive financial statement fraud. Chairman Kenneth Lay, former President Jeffrey 1

Handout 02 - BM- Batches ABC - XLRI 2014 - Managerial Ethics - The Ethics of Market Abuse - XLRI 2014

Embed Size (px)

DESCRIPTION

managerial ethics

Citation preview

Handout 02 – Managerial Ethics - Module – 01A:The Ethics of Market Abuse: Fraud, Corruption and

Bribery

Fr. Oswald A. J. Mascarenhas S.J., Ph.D.JRD Tata Chair Professor of Executive Ethics, XLRI, Jamshedpur

July 10, 2014

Case 2.1: The Enron Corporate Fraud

Incorporated in 1930 and re-incorporated in 1997, Enron, a multinational company that specializes in electricity, natural gas and energy markets and other physical commodities, was re-established in 1985 from the merger of Houston Natural Gas and Inter North of Omaha, Nebraska. In the year 2000, Enron employed 61,000, operated in over 40 countries, and reported revenues of $101 billion, thus wining the seventh rank among Fortune 500 that year.

By October 2000, however, Enron became the pioneer and trendsetter of energy sector corporate aggressive accounting and insider trading irregularities. Among accounting scandals were the numerous “round-trips” it engaged in, and which soon became the industry “norm” for similar scams. For instance, Denver-based Qwest Communications used bandwidth to manufacture illusory revenue streams in its recent deal with Enron. According to investigators, Qwest agreed to pay Enron $308 million for the use of “dark fiber” (or unused fiber optic) capacity. In exchange, Enron agreed to pay Qwest between $86-195 million for access to active sections of Qwest’s network. Both deals turned out to be fake allowing both companies to record fat revenues for the period, and particularly helping Enron avoid reporting a loss for that period (Pizzo, 2002).

Andrew Fastow, a Harvard Business School graduate and chief financial officer (CFO) at Enron, wore two hats. As CFO, he negotiated and set up outside partnerships to conduct Enron business. As the principal in these partnerships, however, Fastow also negotiated with Enron on behalf of the partnerships. This is obviously conflict of interest: which entity did Fastow favor in these deals? Enron’s policies prohibited employees from wearing two hats, but Enron’s Board of Directors exempted Fastow from this rule. The result was a series of money-losing transactions for Enron, and consequently, Enron’s stockholders, creditors and employees all emerged as heavy losers.

A series of fake transactions between Enron and investment partnerships executed by Andrew Fastow, led to its

filing for Chapter 11 bankruptcy protection in June 2001. In October 2001 Enron was suspected of a massive financial statement fraud. Chairman Kenneth Lay, former President Jeffrey Skilling, and former Chief Financial Officer Andrew Fastow, among others, were accused of shielding debt from public view, and overstating revenues and earnings, thus giving the impression of rapid profit growth. The same year, Enron declared bankruptcy, then the largest corporate failure in U. S. history. Its stock price plummeted from $90 in 2000 to $ 0.26 per share, just a few days before fling the bankruptcy petition.

Enron had such a strong following on Wall Street that its CEO Jeffrey Skilling could bluff his way around tough questions about the company’s operations. Yet what happened to force this giant icon to come down in 2001 when its stock plummeted to $0.26 and the company faced almost extinction?

The Company boosted profits and hid debts totaling over $1 billion by improperly using off-the-books partnerships, it bribed foreign governments to win contracts abroad, and it manipulated the California energy market. Ex-Enron executive, Michael Kopper, pled guilty to two felony charges; acting CEO Stephen Cooper said Enron might face $100 billion in claims and liabilities. Enron’s former energy trader, Timothy Belden, pleaded guilty on Thursday, October 17, 2002, to criminal fraud charges admitting he was part of a conspiracy to artificially boost power prices during California’s devastating power crisis (Anderson, 2002). Belden is the first member of the company’s trading team to face such charges. Enron, ranked 7 on the Fortune 500 list two years ago, filed Chapter 11 protection on December 2, 2002 after revealing a $618 million loss and eliminating $1.2 billion of shareholder

1

equity (Hays, 2002). Its auditor, Arthur Andersen, was convicted of obstruction of justice for destroying Enron’s documents.

One of the reasons that Enron's implosion was so destructive was that it had managed to hide its problems through complex “round trip” transactions, a scale that even WorldCom couldn't match. By co-opting Arthur Anderson, formerly one of the world's top five accounting firms, Enron was able to spin out shell companies and special purpose vehicles/entities (SPVs) to hide its fatally wounded core.

Later in October-November 2001, Enron’s Board of Directors scrutinized these transactions. Among the securities scams investigated were associated with Enron’s former Division Head, former CEO, and two former Division Heads, each cashed in stock to mint $270 million, $108 million, $80 million and $74 million respectively; two other directors each cashed in $68 million worth of Enron stock. The company’s stock once peaked at $65; by November 2001 it traded for less than 50 cents. The retirement funds (401K) of more than 45,000 of its American employees forced invested in Enron stock have virtually evaporated since (Fortune 2002; Forbes 2002).

The meltdown of Enron Corporation was one of the largest corporate bankruptcies in history, and certainly represented the biggest accounting scandal ever, and possibly, the largest cash crisis in corporate business. Once a stodgy focused gas pipeline company, Enron redefined itself into the nation’s leading marketer of natural gas, electric power, and bandwidth capacity. It struck hundreds of joint venture deals with domestic and foreign partners alike in projects that diffused its original focus. Revenues soared from $20 billion in 1997 to $31 billion in 1998 to $40 billion in 1999 until it jumped to $100 billion in 2000. Its NYSE annual-high stock price rose from $22.5625 in 1997 to $29.375 in 1998 to $44.875 in 1999, until it peaked at $90.5626 in 2000. Profits increased almost tenfold from $105 million in 1997 to $979 million in 2000. Its total assets expanded from $22.5 billion in 1997 to $65.50 billion in 2000.

Investors have sued Enron ever since, with the accumulated damage to them estimated at over $25 billion. New York-based Amalgamated Bank, which lost millions in the Enron fraud, sued 29 top Enron executives. Enron restated its financial statements, citing accounting errors, and cut profitability for the past three years by about 20 percent, or by around $586 million. Lawsuits against Enron claimed that its top executives reaped enormous personal gains from “off-the-book” partnerships. Meanwhile, Enron’s auditor, Arthur Andersen, allegedly instructed employees to shred critical documents involving fraud. Enron fired Fastow; he was later prosecuted, and later (September 26, 2006) served a six-year prison sentence. Kenneth Lay is dead, and Jeffrey Skilling is currently serving a two-year prison sentence. This tragedy of enormous human, social, economic and monetary losses could have been prevented had Enron applied strict internal cash and accounting controls (Harrison and Horngren 2004).

Vice president Sherron Watkins, CPA at Enron, understood what was going on in the company. She had three alternatives each loaded with high risk: a) report her concerns about Fastow’s deals to Kenneth Lay, CEO of Enron; b) discuss these concerns with her boss, Andrew Fastow, CFO of Enron, or c) do nothing. Under (a) and (b), there was a high chance that Watkins could be ignored or resisted and penalized for blowing the whistle, but there was also a small chance that she could be heard and corrective action taken immediately. Under (c), Watkins would avoid confrontation with Lay or Fastow, but the public (investors, creditors, employees, customers) would suffer if they relied on faulty data. Watkins blew the whistle, reported the matter to the CEO and was severely penalized, but enough damage had already been done to Enron that the company filed for Chapter 11 bankruptcy protection from its creditors in September 2001.

Ethical Questions:

1. Andy Fastow masterminded the Enron fraud. How would you identify and assess the economics and ethics of this fraud?

2. Among accounting scandals, Fastow was known to pioneer “round-trip” sales that apparently did not violate the GAAP codes of those days. Today, it violates the Sarbanes-Oxley Act of 2002 that USA promulgated to prevent such scams. Explain the unethicality and immorality of round-trip sales, and their dangerous economic harm.

3. The retirement funds (401K) of more than 45,000 of Enron’s American employees that were forced to be invested in Enron’s stock have been wiped away. Explore the ethics of injustice in this deal.

2

4. Among other things, Andy Fastow wore two executive hats that implied serious conflict of interest. Explain the ethical implications of such conflict situations.

5. Insider trading irregularities date from the origin of stock markets. But they took a dangerous scale at Enron. Explain the unethicality and immorality of such irregularities, and their dangerous economic harm.

6. By co-opting Arthur Anderson, an accounting firm that also provided consulting services, an obvious of conflict of interests, Enron was able to spin out shell companies and special purpose vehicles (SPVs) to hide its fatally positioned business. Argue the economic, financial and ethical violations of Arthur Anderson, and the shell companies and SPVs that it spun for Enron.

7. Was Sharron Watkins right in whistle blowing? Even though whistle blowing is legal in the USA, and now in India, when and how is it ethically and morally justified and imperative?

Case 2.3: Satyam Computer Services Ltd

Satyam Computer Services Ltd (popularly called as Satyam) proposed on December 16, 2008 that the 20-year old company would spread risk by diversifying into the infrastructure and real estate business by acquiring two family-run firms: a) a listed Maytas Infra Ltd where the Raju brothers had a stake of 35%, and b) an unlisted Maytas Properties Ltd where the family ownership was about 36% (Maytas is Satyam spelt backwards!). Surprisingly, such a proposal to acquire two totally unrelated companies was readily approved by its eminent board. However, the spontaneous and immediate uproar of Satyam investors against the merger proposal led the board to call it off by December 17, 2009. Subsequently, B. Ramalinga Raju, Satyam Chairman, revealed that, especially in the wake of the dot.com bubble bust and subsequent loss of IT business from several Fortune 500 companies, the company had been reporting inflated profits, understating debts, and doctoring other financial parameters to fight its market share erosion vis a vis domestic competitors such as Infosys, Wipro and Tata IT Services. Such self-motivated whistle blowing stunned investors, perplexed government regulators such as SEBI and the CII (Confederation of Indian Industry), intrigued accounting companies, leading to the dismissal of the Satyam board and installing a board of government nominees. The board of directors of Satyam as of December 16, 2008 was as follows:

Name DesignationB. Ramalinga Raju ChairmanB. Rama Raju Managing DirectorRam Mynampadi Whole-time directorMangalam Srinivasan Non-executive independent directorKrishna Palepu Non-executive directorVinod Dham Non-executive independent directorM. Ram Mohan Rao Non-executive independent directorT. R. Prasad Non-executive independent directorV. S. Raju Non-executive independent director

Satyam is a watershed event for the institution of independent directors, wrote Prithvi Haldea (2009), chairman and managing director, Prime Database, in Economic Times. It has demonstrated that even highly credible, qualified, and educated persons are no insurance for corporate governance, that they are no watchdogs of the minority shareholders whose interests they are supposed to serve. In fact boards can serve a negative purpose, that of providing a false sense of security to the minority shareholders. In general, promoters want to enrich themselves and their institutions; the independent directors, on the contrary, should be preventing this from happening. But this is the core of the problem: what if promoters also seek positions of independent directors on boards? When this happens, the promoters as directors may not even recognize or resolve conflict – they could exploit it, as it happened with Satyam. Often, several independent directors may not be aware of some promoter-driven initiatives as they attend only a few meetings a year.

Ethical Questions:

a) To what extent did the Satyam episode bring to light the deficiencies in the corporate governance system in India?b) To restore investor confidence in corporate governance systems in India, an ethical mandate, how would you redefine the

role of the board, the independent directors, the internal auditors, the external auditors, the audit committees, and government regulatory bodies?

3

c) To what extent can corporate governance failures be attributed to factors such as short-term quick fix solutions?d) To what extent can corporate governance ethical failures be attributed to factors such as corporate greed of managers,

chief executives, and even of boards and investors?e) To what extent can corporate governance and ethical failures be attributed to more critical factors such as the lack of a

questioning culture and critical thinking in corporate boardrooms?f) To what extent can corporate governance ethical failures be attributed to lack of effective separation between governance

and management, especially given the fact that several corporations have the CEO (management) as also Chairman (governance) of the board?

Case 2.3: Sherron Watkins and Whistle Blowing at Enron

In summer of 2001, Sherron Watkins switched jobs within Enron to work for Andy Fastow, CFO. In this new back office role, a non-commercial one, Watkins examined assets that Enron had for sale. Basically she examined a spread sheet that had book values with estimated gains or losses on sales. It is here that she stumbled upon what she thought was an accounting fraud. Fastow hedged a number of assets with several entities called the raptors, apparently fraudulent structures or shell companies. Millions of dollars of losses that should have been borne by the raptors were fed back to Enron instead. The interesting part of the story is not the pseudo raptors but the real person behind this game plan.

In 1999, the BOD of Enron made an unprecedented move of waiving the company’s Code of Conduct to allow Fastow to start his own investment partnership, named LJM (named after his wife and children, Lea, Jeffrey and Mathew). Fastow raised $600 million from Enron for this limited partnership. This entity worked exclusively with Enron – to buy assets, and on hedging contracts. All losses of LJM came back to Enron but not its profits. The CEO, Jeff Skilling, concurred with Watkins that LJM was a shady deal; he resigned on August 14, 2001, barely six months on the job. Meanwhile, Enron’s cash flow had dried up by May 2001 as the government regulators stepped in and put price caps. Also, Enron Broadband tanked and the telecom sector was in real trouble. Watkins wrote an anonymous letter to Ken Lay, the new CEO of Enron. Ken, however, did not hire independent inspectors to investigate the allegations of Watkins about LJM and other creative accounting structures at Enron. Instead, Ken began to unwind these structures and forced a write down (non-recurring expenditures) of a billion dollars in the third quarter of 2001, completely wiping previous year’s net income of $979 million.

Much of this loss could be attributed to Enron’s foray into unrelated businesses, especially water business, and broadband business. Moreover, the trading customers got very skittish. Enron had about $18 billion of energy contracts as receivables and $16 billion as trade payables. Within 6 weeks, Enron lost $4 billion in receivables as some of its trading customers went in for closures. On the other hand, most of its $16 billion dollar creditors demanded to be paid during the same time. Enron had no option but to file for bankruptcy by September 2001. [For more details, see Singh 2005: 239-47].

Ethical Questions:

1. What is whistle blowing? Is it legally, ethically and morally justified?2. When is whistle blowing ethical and ethically mandating, and why?3. When is it moral and a moral imperative, and why?4. Will business in general, and young entrepreneurs in particular, be discouraged by whistle blowing?5. How is whistle blowing different from one’s fiduciary duty to the company, and why?6. Why is whistle blowing legal and legally protected in the USA or in India, and with what results?7. How does whistle blowing help society, especially, shareholders, employees, customers and local communities?8. Hence, was Sherron Watkins justified in whistle blowing at Enron?

The Ethics of Fraud as Market Abuse

Fraud has existed since the dawn of humanity and will continue until the end of times. Given human nature and its weaknesses, one’s avarice and greed for money, power and popularity has been the major stimulus for fraudulent crime. The landmark case of fraud is McKesson Robinson, a corporation involved in a 1937 financial statement balance fraud that reported $10 million of non-existent inventories and accounts receivable. This case marked the beginning of required generally accepted auditing standards

4

(GAAS) for independent public auditors.

Fraud exists even today and can occur anytime in an organization. At the same time, there is no special recipe or checklist for detecting and preventing corporate or personal fraud at all times. No such thing exists and no such thing is truly capable of being developed to monitor and control all forms of fraud (Silverstone and Davis 2005: 5-6). Managers should be aware of fraud, deal with the human factors that generate fraud by hiring honest people and keep them honest by instituting strong deterrents of fraud, and deal with the environmental factors that cause crime by enforcing adequate monitors, controls, policies and procedures.

The corporate world is failing in its fiduciary duty and loyalty to its stakeholders. During the last decade, the media has been reporting hundreds of corporate frauds either in the form of accounting misdeeds or insider trading security scandals. Led by Enron in 2001, the list of giant corporate malfeasance grew steadily in 2002 and thereafter. In fact, there is a great fear that we have just scraped the tip of corporate deviant behavioral iceberg.

In the wake of these extraordinary scandals, discussions about the executive virtues of honesty and integrity are no longer academic or esoteric, but critically urgent and challenging. As representatives of the corporation, its products and services, corporate executives in general, and production, accounting, finance, and marketing executives in particular, must be the frontline public relations and good will ambassadors for their firms, products and services. As academicians of business education, we must analyze these corporate wrongdoings as objectively and ethically as possible. What is wrong must be declared and condemned as wrong, what is right must be affirmed and acknowledged as right. We owe it to our students, our profession, and to the business world. This chapter deals with corporate fraud, particularly in terms of its origination and proliferation. Detecting fraudulent accounting practices and insider securities trading irregularities in time, and preventing or forestalling them is an important duty of managers and corporate executives today.

Losing investors’ confidence in the securities market can be disastrous. Thousands of shareholders were shell-shocked and numbed when premium blue chip stock prices trading at the $100 and more levels suddenly plummeted to a few cents a share within a year. What happened? Did the stock market crash? Was it rigged? Neither. In reality, creative accountants fooled the markets – they cleverly inflated reported cash flow from operations by reclassifying items among the operating, investing and financing sections of the statement of cash flows – all this, presumably, well within the boundaries of the then generally accepted accounting principles (GAAP). For instance, in acquisitions, cash paid for working capital could be shifted to the investment section rather than shown as a reduction in cash flow from operations (Mulford and Comiskey 2005: xi).

In an era of questionable and fraudulent accounting, cash flow is the only trustworthy measure of financial performance available. It is almost impossible for accountants to manipulate cash flow. The balance in cash and the total change in cash from one period to the next are generally not prone to misstatement. The balance in cash is readily verifiable from banks and other institutions holding reported balances. Hence, cash is a fact, while profit (which accountants can easily manipulate) is an opinion . Cash flow is real and is not easily subject to the vagaries of GAAP. Most investors rely more on cash flow statements than on reported annual statements such as the balance sheet and the profit and loss statements.

Regardless of whether corporate scams have peaked or not, their intensity, frequency, and magnitude over the last eight to twelve years since 2000, should be a moral and ethical wake-up call for all and must be seriously scrutinized, objectively analyzed, effectively monitored, and expeditiously controlled. This Chapter is a step in this direction. For all practical purposes, corporate scandals represent the level of

5

corporate greed that left unchecked will destroy firms, industries, markets and our business system in general.

The Incidence of Corporate Fraud and Corporate Damages

The top giant five fraudulent companies, Enron, WorldCom, Tyco, Qwest, and Global Crossings, destroyed a combined capital of $460 billion in shareholder value while moving inexorably toward bankruptcy (Stoller 2002; USA Today, October 10, 2002). The cascade of corporate accounting and securities scandals has rocked major security markets of the world, especially the New York Stock Exchange (NYSE) and the NASDAQ markets. The United States of America is the economic engine of world commerce and the cornerstone of the world economy, and therefore, American corporate frauds and scams have affected the stock markets around the world. However, not all of the stock associated with the offending companies has suffered in other markets the way it has in the United States.

According to the 2002 Report of the Association of Certified Fraud Examiners (ACFE) on Occupational Fraud and Abuse, on average, U. S. organizations lose about six percent of revenues owing to dishonesty from within. When adjusted to U. S. Gross Domestic Product, the cost of occupational fraud and abuse amounts to over $600 billion annually. The ACFE had conducted a similar study in the mid-1990s based on voluntary reports of over 2,600 frauds, estimating losses to $400 billion annually, or about $9 per day per employee (ACFE 1996). Such abuses may include everything from disorders in the mailroom to the boardroom, from employee theft, purchasing managers’ kickbacks to corporate embezzlement, but corporate fraud takes the lion’s share of organizational fraud and abuse (Albrecht and Albrecht (2004: viii). These numbers understate the real damage, as it is impossible to know what percentage of fraud is really discovered, and what percentage of fraud perpetrators are eventually caught and brought to justice. In addition, many frauds that are discovered are handled out of court and clandestinely and never made public (Albrecht and Albrecht (2004: 3).

Each dollar lost in fraud is a dollar loss of net income, and hence, it takes significantly more sales revenue to recover the effect of fraud loss on net income. For example, a fraud loss of $100 million to an automobile manufacturer whose profit margin (i.e., net income divided by revenues) is ten percent would necessitate the manufacturer to generate additionally ten times the fraud loss, that is, $1billion in revenue to recover the effect on the net income. If the average ticket price of a car were $20,000, this would imply that the auto manufacturer would have to make and sell an additional 50,000 cars ($1 billion/$20,000) to counterbalance the fraud loss. Meanwhile, this loss could be easily passed on to the consumer via higher ticket prices. Alternately, if that amount is deducted from R&D, the opportunity loss of $1 billion could affect the quality of cars.

Whereas most employee crimes in the past were theft of physical goods (e.g., stationery, money, commodities) that were either in small amounts or infrequent, owing to fear of being caught, modern crime is much more sophisticated and electronic in nature. Telecommunications, particularly the computers and the Internet, have facilitated and stimulated corporate fraud. Employees now need only to make a telephone call, misdirect purchase invoices, bribe a supplier, manipulate a computer program, misplace company assets, and other fraudulent transactions by a mere push of a key on computer, PDA or Blackberry keyboards. Most of them take years to be detected.1

1 Corporate fraud is a growing problem. The FBI (USA) has labeled fraud the fastest growing crime and hence, has committed almost 24 percent of its resources to fighting fraud. At any given time, the FBI is investigating several hundreds of cases of fraud and embezzlement, each averaging to over $100,000 in damages. These cases, however, relate just to FBI jurisdiction. Secondly, insurance companies, that provide fidelity bonding or other types of coverage against employee and other fraud, undertake regular investigations within their jurisdiction of employee bonding or similar insurance. Occasionally, researchers conduct studies about particular types of fraud in specific industrial sectors. Fourthly, victims of fraud report crime. All four sources of fraud, however, are incomplete, jurisdiction-specific, and periodical. They fail to provide a comprehensive

6

Basic Definitions regarding Fraud

A fraud, in general, means deliberate misrepresentation. It implies a deliberate or willed and planned misrepresentation of subjects, objects, properties, and/or events (SOPE) in a deviant behavior situation.

The Association of Corporate Fraud Examiners (ACFE) in 1996 defined an occupational fraud as “The use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization’s resources or assets” (ACFE 1996: 4). This definition has remained more or less the same in 2004: an occupational fraud is “the use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization’s services or assets” (ACFE Report 2004).

The ACFE defines occupational fraud against one’s organization. ACFE also defines fraud as an activity that is: a) clandestine, b) which violates the employee’s fiduciary duties to the organization, c) is committed for the purpose of direct or indirect financial benefit to the employee and d) which costs the employing organization assets, revenues or reserves (ACFE 1996: 9). The term “employee” in this definition includes employees of all categories: blue- and white-collar labor, managers, corporate executives, including CEOs, CFOs, and presidents. Fraud can encompass any crime that uses deception as its primary method or modus operandi.

Based on the Webster’s Dictionary (4th edition, 2002) we may identify the following fraud synonyms or equivalents:

Deception: The act or practice of deceiving. The fact or condition of being deceived. Something that deceives, as an illusion, or is meant to deceive, as a fraud. In marketing, the word deception has been defined as those instances in which consumers change their behavior for reasons not grounded on “fact” or “reality” but on beliefs and impressions made on them by the influencer (such as advertising, marketers, sales representatives) (Gardner 1975). Often, consumers are influenced by non-substantial attributes and features of a product (such as style, appearance, color, sheen, display) at the expense of disregarding the intrinsic aspects of the product” (Gardner 1975: 43).

Fraud: Deliberate deception in dishonestly depriving a person of property, rights, etc. Mislead: To lead in a wrong direction, error of judgment or into wrongdoing. This may or may not

be intentional. Subterfuge: An artifice or stratagem used to deceive others in order to evade something or gain some

end. Trickery: Implies the use of tricks or ruses in deceiving others. Chicanery: Implies the use of petty trickery and subterfuge, especially, in legal actions. Beguile: To mislead people by one’s charm or persuasion of cheating or tricking. Seduction: (In a marketing context) “means interactions between marketer and consumer that

transform the consumer’s initial resistance to a course of action into willing, even avid, compliance” (Deighton and Grayson 1995: 660). It is “the enticement of a consumer into an exchange where ambiguity is resolved by a private (non-institutionalized) social consensus that the consumer plays a part in constructing” (Ibid 668). Seduction is a strategy whereby consumers are induced to tolerate overlook unsustainability, or even to connive in denying it. In this sense, seduction is more voluntary than fraud and more collaborative than entertainment - a playful, game-like social form (Ibid 661).

Thus, deception is a broader term that applies to anything that deceives, whether by design (fraud), by delusion (trickery or illusion) or by device (subterfuge and chicanery). A fraud is a deliberate misrepresentation or nondisclosure of a material fact made with the intent that the other party will rely

and up-to-date picture of organizational fraud at the national level.

7

upon it. If the party did in fact rely upon such a misrepresented statement, and if this causes injury, then the person may bring an action to rescind the contract. Statements of opinion, however, may not be usually used as a basis for fraud or misrepresentation. If the seller says, "This car is the best buy in town," such a claim is treated as a statement of opinion or puffery, but not a statement of fact. However, if the person making such a claim has "superior knowledge" having specific expertise in the field, and the buyer relies on this expertise in the actual purchase, then such a claim may be equivalent to a misrepresentation. 2 The misrepresentation must be of a present or a past fact. False statements regarding the future are not actionable. In addition, in general, silence or nondisclosure is not fraudulent, unless nondisclosure relates to “material” facts regarding an inherently dangerous product. If the manufacturers/sellers, however, choose to speak, they must tell the whole truth. Deceptive partial disclosures often amount to fraudulence.

Corporate Frauds as Deceptive Trade Practices

Corporate frauds are deceptive trade practices. Traditionally, the concept of deceptive trade practices included all transactions that have a "tendency or capacity" to mislead consumers. One did not have to prove actual harm to any specific group of consumers. The courts have not changed the "tendency or capacity standard". However, the Federal Trade Commission (FTC) of USA came with new guidelines for deception. In the early 1970s, in the context of deceptive ads, the FTC used three tests to determine whether to take action against trade practices: 1) the FTC must conclude that the ad is "likely to mislead consumers"; 2) the misleading ad must be “material” to subsequent purchase, and 3) misled consumers must be "acting reasonably in the circumstances." All three criteria apply to corporate frauds as deceptive trade practices.

A lie is not the same as deception or fraud. The Oxford English Dictionary defines: "A lie is a deliberate false statement that is intended to deceive others". Deception does not always need a false statement to deceive. A lie is a deliberate false statement that is either intended to deceive others or foreseen to be likely to deceive others (Brandt and Preston 1977; Carney 1972). Most frauds in the form of creative accounting practices are “lies” in this sense. From a legal perspective a lie is (a) a deliberate withdrawal of (b) material information from (c) a person who has (d) a right for that information (e) at the time of the withdrawal. The “deliberate withdrawal” of rightful information is a deliberate false statement. Thus, lie is a form and subset of deception.

Embezzlement means to take willfully, or convert to one’s own use, another’s money or property of which the wrongdoer acquired possession lawfully, because of some office or employment or position of trust. Embezzlement, therefore, implies three elements: a) fraudulent appropriation or conversion of money, b) that the wrongdoer acquired because of his office or position, and c) that the said money belongs to the employer or employing company. Thus, embezzlement is a special type of fraud.

Fraud is different from robbery. The latter uses physical force on someone to give the robber what he wants. Fraud deceives or tricks you out of your assets. Robbery often involves force and violence. Fraud involves surprise, cunning, deception and trickery by which one violates someone’s confidence, and gets an advantage by false misrepresentation. Fraud betrays trust of one’s customers or clients.

2 The "Recovery Theory" in the U. S. Law is also based on the definitions of "fraud" and "misrepresentation." A misrepresentation occurs when a person, by words or acts, creates in the mind of another person an impression not in accordance with the facts. Example: If the seller of a passenger car expressly states that the auto has been rebuilt to meet tougher road conditions, when it has not been, and if the buyer relies heavily upon this statement (hence a "material fact") in deciding the purchase, then the latter’s decision was not freely and voluntarily made, but triggered by misrepresentation. A fact is "material" if the person trying to avoid the contract will not have entered into it had he/she known of the misrepresentation. The buyer may ask a court to free him/her of the contractual obligations of the purchase contract.

8

Fraud is different from larceny, which is a form of stealing. The legal term for stealing is larceny. According to Black’s Law Dictionary, larceny is felonious stealing, taking and carrying, leading, riding, or driving way another person’s personal property, with the intent to convert it or to deprive the owner thereof (Black 1979: 792). Thus, the essential elements of a larceny are a) an actual or constructive taking away of the goods of another, b) without the consent or against the will of the owner, and c) with a felonious intent. Obtaining possession of property by fraud, trick or devise with preconceived design or intent to appropriate, convert or steal is larceny. Thus, fraud is a subset of larceny.

Fraud is different from bribery or corruption. Bribery in the USA is giving or receiving of anything of value by a subcontractor to a prime contractor. Black’s Law Dictionary (1979: 311) defines bribery or corruption as “an act done with intent to give some advantage inconsistent with official duty and the rights of others. It is an act of an official or fiduciary person who unlawfully and wrongfully uses his station or character to procure some benefit for himself or for another person, contrary to duty and rights of others.” 3

Fraud differs from skimming: a subtle practice of stealing a small portion of a resource (e.g., money, commodity) that presumably will not be noticed. Skimming is a subset of larceny. [See Business Executive Exercises 2.1].

Summarizing and synthesizing most of the above definitions of deviant behaviors, Table 2.1 characterizes major physical transactional abuses – these include coercion, con games, theft by stealth, theft by fraud and theft by force. Table 2.2 characterizes non-physical transactional abuses such as verbal pressures via exaggerated financial statements, aggressive ads and other deceptive promotional tools. Exhibit 2.1 is a simpler taxonomy of a wide variety of deviant behaviors. Exhibit 2.2 distinguishes between fraud, corruption and bribery. This Exhibit assumes that corruption and bribery are subset of frauds as deliberate misrepresentation.

Exhibit 2.1: A Simple Taxonomy of Business Deviant Behaviors

Task Execution Task AmbiguityLow High

Non-Physical: Persuasion,

Forced consensus

DiscriminationCorruptionBriberyFraudTheft by Fraud

Trickery, BeguileChicanery, Conning,Seduction, DeceptionMoney-laundering;Racketeering;Theft by Stealth

Physical: Much Force and

Undue Power-pressure

LarcenyStealingRobberyTheft by Force

TerrorismEthnic CleansingGenocidePreemptive WarsAggressive wars

3 Bribery violates Title 18, US Code # 201; punishable by up to 15 years in prison + fines of 3 times the value of the bribe + bribing officer is disqualified. Bribery also violates Foreign Corrupt Practices ACT (FCPA), Title 15, US Code # 78. Bribery in the form of kickbacks violates Title 41, US Code #s 51-58; up to 10 years in prison.

9

Exhibit 2.2: Distinguishing between Fraud, Corruption, and Bribery

Fraud as Deliberate

Misrepresentation Regarding:

Deliberate Misrepresentation as:Conspiracy-Abuse Factual-Abuse

Past and Current Facts, Figures and

History

Corruption as Deception:Deceptive accounting;Income smoothing;Ghost or shell companies;Ghost employees or accounts;Restating annual financial statements

Corruption as Accounting Bribery:Kickbacks;Wash Trading or Round Trip sales;Accounting abuses (e.g., over-invoicing, under-invoicing, dumping)Hostile Takeovers;

Past, Current and Future

Decisions, Strategies and

Actions

Corruption as Deceptive Advertising:Lies, Cheating, Subterfuge;Under- disclosure or Over-disclosure;Planned buyer-seller information asymmetry;Promoting non-existent patents or products/services;Hyping IPOs;Covering or disguising product/service defects

Corruption as Financial Bribery:Insider Trading;Active or passive bribery;Excessive executive compensation;Seduction;Market dominance;Undue market entry barriers;Exorbitant pricing or price wars;Dishonoring warranties and guarantees

Corporate Financial

Statements and Annual Reports

Corruption as Deceptive Reporting:Understating Debt;Overstating revenues;Overvaluing tangibles/intangibles;Massive write-downs

Corruption as Abusive Reporting:Over-borrowing based on inflated collateral;Tax Evasion gimmicks;Inflating bad debts, theft, wastage and other damages for tax exemptions and insurance claims

Types of Corporate Fraud

Albrecht and Albrecht (2004) define and classify occupational frauds as using one’s occupation to

cheat ones organization or for the benefit of one’s organization. Table 2.3 lists commonest frauds by type, perpetrators, and methods, victims, and costs of deception. The fraud types listed in Table 2.3 are in the descending order of the magnitude of fraud losses in relation to money, market valuation, brand equity, supplier goodwill and customer loyalty, cash crisis, insolvency and bankruptcy. Hence, our list heads with management fraud followed by securities scams or insider trading, investment scams, tax fraud, racketeering, vendor fraud, employee fraud, computer fraud, bribery, and customer fraud. Other things being equal, historically, the magnitude of money and non-monetary damages of frauds could be estimated along the rank order suggested in Table 2.3.

The most common occupational frauds on behalf of one’s organization are those of the top management that result in false financial reporting. Financial statement frauds occur in companies that are experiencing net losses or have profits much less than forecasts or expectations. Such frauds make corporate earnings look better and thus, increase the stock’s price. Often, executives misstate corporate earnings in order to draw larger year-end bonuses. [See Business Executive Exercise 2.2].

10

Basic Instruments of Corporate Frauds

Several types or patterns of corporate financial scandals are reported (e.g., See Yahoo! Finance, various reports):

1. Unscrupulous brokers: sale of fictitious limited partnerships to boost revenues.2. Wash Trades: sale of a product to another company with a simultaneous repurchase of the same

product at the same price; these swindles uniquely inflate sales by units and dollar volume without recording any profits.

3. Oil and gas schemes (scammers speculate on oil shortages or a rise of natural gas prices).4. Equipment leasing (scammers sell interest in pay phones, cash machines or Internet kiosks to seduce

thousands of investors). 5. Affinity frauds (scammers use their victims’ religious or ethnic identity to buy or gain their trust and

then steal their life savings).6. Promissory notes (e.g., short-term debt instruments sold by independent insurance agents and issued

by little-known or non-existent companies promising no-risk high returns).7. Prime-bank schemes (e.g., scammers promise investors triple-digit returns through access to the

investment portfolios of world’s elite banks such as Rothschild banking family or Saudi Royalty).8. Aggressive accounting (e.g., converting long-term debts to assets, purchase intentions to actual

purchases, future orders to current ones).9. Analyst research conflicts (e.g., Merrill Lynch issued misleading research reports, and had to pay

$100 million fine in May 2002, in New York, and had to institute several significant changes in the way it does business). (See Berkenbilt 2002)

All nine corporate scam-types involve selling or buying under fraudulent conditions, and hence, fall well within the domain of fraudulent marketing.

The U. S. Federal Energy Regulatory Commission (FERC) defines “wash trading,” also known as “round trip” trading or “sell/buyback” trading, as the sale of a product to another company with a simultaneous purchase of the same product at the same price. Essentially, wash trading is a false trading because it boosts the companies' trading volume, or even sets benchmark prices, but shows no gains or losses on the balance sheets. While this kind of trading may not be strictly illegal, (possibly, they are too recent frauds to receive federal scrutiny), it can manipulate the power market, which is illegal and it is downright unethical. An inflated balance sheet from round-trip trading misleads investors about the true value and volume of the company's business. Misled investors may tend to invest more, thus jacking up the corresponding stock price. Large volumes of "wash trades” raise the revenues but have no effect on earnings. For example, in the energy industry, round-trip trades involved the simultaneous purchases and sales of energy at the same quantity between the same parties; they inflated revenues in both companies but added no profit. For instance, in the energy trading market controlled by fraudulent energy companies such as Enron, CMS Energy, Duke Energy, Dynergy, and Reliant Energy, each company indulged in the same basic type of wash trading and thereby seriously affected market prices and shortages (see Forbes.com’s accounting tracker Internet service).

Wash trading also affects final consumers. For instance, wash energy trading created false congestions and the perception of energy shortage in the Californian market in 2001, and the price of electricity paid both by the industrial and home users skyrocketed (USA Today April 4, 12, 2002). Also, on September 23, 2002, Allegheny Energy, a Maryland electric utility company, sued Merrill Lynch for $605 million and more unspecified punitive damages in a New York state court. The charge stated that Merrill inflated revenues of Global Energy Markets (GEM) through a series of “round-trip trades” with former industry giant Enron, before selling it to Allegheny for $490 million in 2001. The lawsuit also accused Merrill for misrepresenting the qualifications (e.g., age, experience) of Daniel Gordon, GEM’s

11

head (Yahoo! News, Thursday, September 26, 2002, 9:25 am, EST).

Fraud versus Occupational Abuse

Occupational abuse is a form of fraud, presumably of smaller proportions. Nevertheless, abuses imply some form of cheating and cost to the employers. Consider the following typical employee abuses:

1. Use sick leave when not sick.2. Come to work late or leave work early.3. Take a long lunch break without approval.4. Indulge in slow and sloppy work.5. Declare or punch more hours than worked for and get paid.6. Work under the influence of alcohol or drugs.7. Take products or stationery belonging to the organization (pilferage).8. Pad your expense accounts. That is, collect more money than due on business expense

reimbursements.9. Use employee discounts to purchase goods for relatives or friends.10. Use company’s computers during office hours to engage in personal email or securities exchange.

All of these behaviors are examples of occupational fraud. According to the Association of Corporate Fraud Examiners (ACFE), an occupational fraud is “the use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization’s services or assets” (ACFE Report 2004). This definition is broad enough to include fraud schemes as simple as pilferage to complex financial statement frauds. Each of these abuses implies: a) some clandestine behavior, b) violation of perpetrator’s duties to the victim organization, c) some form of cheating the employer, d) which costs the employer some money, revenues or assets, and e) some direct or indirect financial benefit to the perpetrator.

The first five examples relate to cheating on time spent on work for which the employer must pay extra. The sixth case of alcohol or drugs cheats on the quality of work that you owe to the company. The next three abuses cheat on products and/or money. The tenth abuse cheats the company on everything: time spent on work, quality of work and using company’s products/services for one’s private business. All ten examples involve a corrupt practice, deception, and improper use of one’s fiduciary trust. Fiduciary duty implies that you are employed (entrusted with responsibilities) on the condition that you are trustworthy and that you do not betray the trust your employer has in you.

In practice, how do you distinguish fraud from abuse? The difference is a matter of perspective. Fraud implies more conspiracy and conspirators, more scheming, affects more people, involves greater losses, and negatively affects large assets of the company. In contrast, abuses are often single-handed actions that are ordinary and routine deceptions, which mostly benefit just the abuser, and involve smaller corporate losses. [See Turnaround Executive Exercises 2.3].

Let us illustrate the difference between corporate fraud and corporate abuse by an example. Jane is a bank-teller, and steals $100.00 each day for five different days of a quarter from her cash drawer. John is also a teller who earns $500.00 a week, and calls in sick (when he was healthy) five different days during the same period. Normally, the former crime would be called a fraud, and the latter action an abuse, even though the damage to the bank in both cases is the same amount, namely $500.00. Each offense implies a dishonest intent to benefit oneself at the expense of the company. Both violate their fiduciary duties to the employer and betray the trust the employer had in them. Yet the punishment meted out in each will be different. Jane would be fired for embezzlement and possibly prosecuted while John will be gently reprimanded, and for repeated offense, his pay may be docked for a day or two. Jane stole money, but

12

John stole time (which is equivalent in money to Jane’s damage to the company). Jane’s action, however, will be treated as a crime of embezzlement or stealing, while that of John would be treated as misconduct or inappropriate behavior. It is a matter of perspective (Wells 2004: 4).

Based on Wells (2004: 46), Table 2.4 presents a detailed taxonomy of occupational fraud and abuse. Table 2.4 traces occupational fraud to three major action-sources: a) corruption practices, b) misappropriation of assets, and c) falsifying financial statements. Table 2.4 also includes several major types and sub-types of occupational fraud under each of these three heads. Vigilant managers could use this exhaustive list to check and identify occupational frauds in their companies.

Fraud has existed since the dawn of humanity and will continue until the end of times. Given human nature and its weaknesses, one’s avarice and greed for money, power and popularity has been the major stimulus for fraudulent crime. The landmark case of fraud is McKesson Robinson, a corporation involved in a 1937 financial statement balance fraud that reported $10 million of non-existent inventories and accounts receivable. This case marked the beginning of required generally accepted auditing standards (GAAS) for independent public auditors.

Fraud exists even today and can occur anytime in an organization. At the same time, there is no special recipe or checklist for detecting and preventing corporate or personal fraud at all times. No such thing exists and no such thing is truly capable of being developed to monitor and control all forms of fraud (Silverstone and Davis 2005: 5-6). Managers should be aware of fraud, deal with the human factors that generate fraud by hiring honest people and keep them honest by instituting strong deterrents of fraud, and deal with the environmental factors that cause crime by enforcing adequate monitors, controls, policies and procedures.

Corporate Financial Irregularities

Corporate financial irregularities include several deviant behaviors and data manipulations. Some of these are: overselling shares to depress stock prices, overstating financial worth to boost stock prices, overstating revenues by “round-trip” sales, understating debts, or, in general, “cooking” the books to influence better SEC ratings. In general, financial irregularities are classified under two major heads: a) Accounting Irregularities and b) Insider Trading Irregularities.

Most corporate accounting irregularities come under two heads: a) Fake transactions like “round-trip” sales, and b) manipulation of debts and assets to overstate the value of the company. The U. S. Federal Energy Regulatory Commission (FERC) defines wash trading, also known as "round trip" or "sell/buyback" trading, as the sale of a product, e.g. electricity, to another company with a simultaneous purchase of the same product at the same price.

Essentially, wash trading is false trading because it boosts the companies' trading volume, or even sets benchmark prices, but shows no gains or losses on the balance sheets. While this kind of trading may not be illegal as per then GAAP, it can manipulate the power market, which is illegal. Most of the large scams recently uncovered were in the utility business (See Forbes 2002, July 25; Fortune 2002, September 2). Several wholesale power traders revealed that they participated in the so called "round trip" or "wash trading." For instance, wash-trading practices among some energy companies created false congestion and generated the perception of an energy shortage in the troubled California energy market in 2001-2002. Some would even argue that this practice contributed to the bankruptcy of the two largest California electric utilities and forced subsequent government support to keep power flowing there. The price of electricity skyrocketed and in the end, it was the consumer who had to pay the price for corporate accounting frauds. An inflated balance sheet from round-trip trading misleads investors about the true

13

nature and volume of the company's business. Large volumes of "wash" trades raise the revenues but have no effect on earnings.

Recent Corporate Accounting Irregularities

Round-trip Sales:

1. Enron and Qwest Communications: Denver-based Qwest Communications used bandwidth to manufacture illusory revenue streams in its recent deal with Enron. According to investigators, Qwest agreed to pay Enron $308 million for the use of “dark fiber” (or unused fiber optic) capacity. In exchange, Enron agreed to pay Qwest between $86-195 million for access to active sections of Qwest’s network. Both deals turned out to be fake allowing both companies to record fat revenues for the period, and particularly helped Enron avoid reporting a loss for that period (Pizzo 2002). Qwest admitted that an internal review found that it incorrectly accounted for $1.6 billion in sales. It restated results for 2000, 2001, and 2002. It was planning to sell its phone director unity for $7.05 billion in order to raise funds.

2. CMS Energy (May 2002): It executed several “round-trip” trades with Reliant Energy artificially to boost energy-trading volume. Thomas Webb, former CFO of Kellogg, has been appointed as its new CFO since August 2002. These companies have admitted that they have wash traded close to $6 Billion in sales revenues, either between these two companies, or involving other energy companies involved in the fraud.

3. Dynergy (May 2002): also executed “round-trip” trades artificially to raise its energy trading volume and cash flow. S&P cut Dynegy’s rating to “junk,” even though the company is conducting a re-audit.

4. El Paso (May 2002): Also executed “round-trip” trades artificially to enhance energy-trading volume. Oscar Wyatt, a major shareholder and renowned wildcatter, may be engineering a management shake-up.

5. Duke Energy (July 2002): Duke engaged in 23 “round-trip” trades to boost trading volumes and revenue. Duke claims that its round trip trades had no “material” impact on current or prior financial periods.

6. Global Crossing: February 2002, the company engaged in network capacity “swaps” with other carriers to inflate revenue and shredded documents related to securities practices. Company filed Chapter 11 bankruptcy protection. The Congress is investigating the role of its securities firms in its bankruptcy.

7. Homestore.com (January 2002): Inflated sales by booking barter transactions as revenue. The California State Teachers’ pension fund, which lost $9 million on a Homestore investment, has filed suit against the company.

8. Merck (July 2002): Recorded $12.4 billion in consumer-to-pharmacy co-payments that Merck never collected. Even though SEC approved Medco’s IPO registration that would raise $1 billion, the company has withdrawn from it.

Thus far, the FERC has demanded disclosure on wash trading from almost 150 energy companies from all over the United Sates. Only when the investigation is complete and other wash trading information is uncovered will we be able to assess how widespread this trading actually was.

Inflating or Restating Revenues:

9. Halliburton (May 2002): Improperly booked $100 million in annual cost overruns before customers agreed to pay for them. The legal watchdog group Judicial Watch filed a securities fraud against Halliburton.

10. WorldCom: (March 2002): It overstated cash flow by booking $3.8 billion in operating expenses as capital expenses. It gave founder, Bernard Ebbers, $400 million in off-the-book loans. By the end of 2002, the WorldCom scam totaled $16 billion. The company found another $3.3 billion in bogus securities, and may have to take a goodwill charge of $50 billion to write-off its debts. Former CFO Scott Sullivan and ex-controller

14

David Myers have been arrested and criminally charged. David Myers agreed to be guilty on September 26, 2002.

11. Peregrine Systems (May 2002): It overstated $100 million in sales by improperly recognizing revenue from third-party resellers. It slashed nearly 50% of its workforce to cut costs. With a third auditor in 3 months, it has yet to file its 10K for 2001; hence, it may be soon de-listed from the NASDAQ. Currently, it is restating revenues from April 1999 to December 2001, during which John Moores, Chairman, dumped $530 million of stock (Fortune, September 2, 2002).

12. Adelphia Communications (nation’s 6th largest cable TV company): April 2002, the founding Rigas family collected $3.1 billion in off-balance sheet loans backed by Adelphia, and overstated results by inflating capital expenses and hiding debt. The company filed for Chapter 11 bankruptcy on June 25, 2002. Three Rigas family members and two other ex-executives were arrested for fraud on July 24, 2002. The company is suing the entire Rigas family for $1 billion for breach of fiduciary duties, among other things (Forbes, July 2002).

13. AOL Time Warner: As the media market faltered and AOL’s purchase of Time Warner loomed, AOL inflated sales by booking barter deals and advertisements it sold on behalf of others as revenue to keep its growth rate up and seal the deal. AOL also boosted sales via “round-trip” deals with advertisers and suppliers. The Department of Justice (DOJ) has ordered AOL to preserve it documents. AOL confessed that it might have overstated revenue by $49 million. New concerns are that AOL may take another goodwill writedown, after it took a $54 billion charge in April (Forbes, July 2002). The scandal went public in July 2002.

14. Bristol-Myers Squibb: Inflated its 2001 revenue by $1.5 billion by “channel stuffing” (i.e., forcing wholesalers to accept more inventory than they can sell to get it off manufacturer’s books). Efforts to get inventory back to acceptable size will reduce Squibb’s earnings by 61 cents per share through 2003 (Forbes, July 2002). The scandal was disclosed in July 2002.

15. K-Mart (January 2002): Allegedly, its securities practices were intended to mislead investors about its financial health. The company, then in a bankruptcy situation, was undertaking a “stewardship” review to be completed by the end of 2002. February 26, 2003, two Kmart executives were indicted by a Detroit grand jury on federal charges of fraud, conspiracy and making false statements over their recording of a $42 million payment that resulted in an overstatement of Kmart’s results (Hays 2003).

Ethical Implications

Deliberate accounting irregularities are failures of corporate accountability. In the wake of these escalating corporate accounting scandals, several ethical and moral questions arise. As responsible ambassadors and representatives of the corporation, and of its mission, products and services, corporate executives in general, and accounting executives in particular, must represent integrity, honesty and corporate responsibility to customers, shareholders and other stakeholders.

The Enron bankruptcy raised questions about the validity of the independent audits and of the business practices of the accounting industry itself. It is clear that the auditors failed to pinpoint the accounting irregularity problems with companies involved in corporate scams. Given the fact that the accounting practices are relatively simple, it is hard to believe how easily the accounting firms disguised the truth, presumably in collusion with the audit and accounting branches of the implicated firms. It is just hard to accept that the accountants did not assess the magnitude of these frauds. Clearly, the accounting principles and rules were not followed.

There were systems level failures at several points that allowed many corporate frauds and scams to remain undetected until they were so large that they bankrupted large companies, with billions of dollars of loss in shareholder equity. Some of the biggest and most prestigious U. S. accounting firms (e.g., Arthur Anderson, Deloitte & Touché, Ernst & Young, KPMG, and Price Waterhouse & Coopers) offered

15

consulting services to the same companies they also audited. This is gross conflict of interest. These firms clearly compromised their credibility and independence when they had to audit their own work. The Securities and Exchange Commission (SEC) failed to bar accountants from also being consultants for the same company due to extensive pressure from the accounting lobbying groups. The same groups have contributed millions of dollars to individuals, political activity campaigns (PACs), and soft money contributions to fight any SEC rules change. Some of the largest scams recently uncovered were in the utility business (see Appendix 2.1 and 2.2). Several wholesale power traders revealed that they participated in the so-called "round trip" or "wash trading" practices.

Insider Trading Irregularities

Early 2000 marked the beginning of some of the worst corporate security irregularities in history. Rapidly rising stock prices followed by the eventual market collapse might have led these executives to unusual activities and practices in corporate transactions that were either questionable in terms of their ethical and moral implications, or were outright violations of the law. For instance, Forbes (July 25, 2002) listed top 25 securities irregularities among top management executives, and little later, Fortune (September 2, 2002) featured another list of 25 largest corporate irregularities in the form of corporate accounting frauds and security scandals. The latter list of securities irregularities involved a total haul of $23.074 billion dollars, averaging to $923 million per company. The list named 55 top executives laundering $14.147 billion with over 257 million dollars per person. Incidentally, the Fortune 2002 report resulted from a research conducted during 2001 in conjunction with the University of Chicago, School of Business. The current avalanche of security irregularities could represent just the tip of the iceberg. Each business week of the last two years (2000-2002), the media has been featuring at least one or other top corporate executives of the country confessing either accounting frauds or securities irregularities or both.

Definitions and Discussion of some Key Terms

Insider Trader: The term insider is specially defined in Section 16b of the U. S, Securities Exchange Act of 1934 that limits short-term transactions by insider parties (Vagts 1979: 827). Section 16b of the 1934 SEC Act imposes express liability upon insiders - directors, officers, and any person owning more than ten percent of the stock of a corporation listed on a national stock exchange or registered with the SEC - for all profits resulting from their “short-swing” trading in such stock. The insiders are assumed to have special access to insider information concerning a corporation either because of financial interests and/or a managerial position. If any insider sells such stock within six months from the date of its purchase or purchases such stock within six months from the date of its sale, the corporation is entitled to recover any and all profit the insider realizes from these transactions. The “profit” recoverable is calculated by matching the highest sale price against the lowest purchase price within the relevant six-month period, and losses cannot be offset against profits (Mann and Roberts 2000: 961). Individuals classified as insiders are subject to special restrictions in using such data in trading in securities. Insider trading during a tender offer is prohibited by Rule 14e-3 of the 1934 SEC Act (Mann and Roberts 2000: 963). A tender offer is a general invitation to shareholders to purchase their shares at a specified price for a specified time. Section 14e imposes civil liability for false and material statements or omissions or fraudulent, deceptive, or manipulated practices in connection with any tender offer.

Security: A security includes any note, stock, bond, pre-organization subscription, and investment contract. An investment contract is an investment of money or property made in expectation of receiving a financial return solely from the efforts of others. Securities not subject to the registration requirements of the 1933 SEC Act are “exempt securities” which include short-term commercial paper, municipal bonds, and certain insurance policies and annuity contracts. Non-exempt securities come under 1933 Act such as notes, stocks, bonds and some investment contracts. Similarly exempt transactions are issuance of securities that do not come under the registration requirements of the 1933 Act (e.g., limited offers, intrastate issues). Disclosure of accurate material information is required in all public offerings of non-exempt securities unless offering is an exempt transaction.

16

Disclosure requirements: these are statements disclosing specified information that must be filed with the SEC and furnished to each client. Insiders are liable under Rule 10b-5 for failing to disclose material, nonpublic information to the SEC and each client before trading on the information.

Antifraud Provision: Rule 10b-5 makes it unlawful to 1) employ any device, scheme, or artifice to defraud; 2) make any untrue statement of a material fact; 3) omit to state a material fact without which the information is misleading; 4) engage in act, practice, or course of business that operates or would operate as a fraud or deceit upon any person. Recovery of damages under Rule 10b-5 requires proof of: 1) a misstatement of omission; 2) materiality; 3) scienter (intentional and knowing conduct), and 4) relied upon 5) in connection with the purchase or sale of a security. In an action for damages under Rule 10b-5, it must be shown that the violation was committed with scienter or intentional misconduct. Negligence is not sufficient.

Material: A misstatement or omission is material if there is a substantial likelihood that a reasonable investor would consider it important in deciding whether to purchase or sell a security. Examples of material facts include substantial changes in dividends or earnings, significant misstatements of asset value, and the fact that the issuer is about to become a target of a tender offer.

Tippers – These pass on insider information that they had a legal obligation to keep secret even though they do not trade on it themselves. Correspondingly, a Tippee is someone who accepts insider information from a person who should not have revealed it, and trades on it.

Insiders, for the purpose of SEC Rule 10b-5, include directors, officers, employees, and agents of the security issuer, as well as those with whom the issuer has entrusted information solely for corporate purposes, such as underwriters, accountants, lawyers, and consultants. In some instance, the rule also precludes persons (tippees) who receive material, nonpublic information from insiders (tippers) from trading on that information. A tippee who knows or should know that an insider has breached his fiduciary duty to the shareholders by disclosing inside information to the tippee is under a duty not to trade on such information (Mann and Roberts 2000, p. 962).

Insider Trading: SEC Rule 10b-5 applies to sales or purchases of securities made by an “insider” who possesses material information that is not available to the public (Mann and Roberts 2000, p. 961). More specifically, it is the attempt to benefit from stock market fluctuations by using unpublicized information gained on the job (Mescon, Bovée and Thill 2002, p. 58). An insider who fails to disclose the material, nonpublic information before trading on the information will be liable under Rule 10b-5, unless he or she waits for the information to become public. The U. S. Supreme Court has upheld the misappropriation theory as an additional and complementary basis for imposing liability for insider trading. Under this theory, persons may be held liable for insider trading under Rule 10b-5 if they trade in securities for personal profit using confidential information misappropriated in breach of a fiduciary duty to the source of the information; this liability applies even though the source of information is not the issuer of the securities that were traded (Mann and Roberts 2000, p. 262).

Insider Information: Insider information is data or news that has not been publicly released and that could affect a shareholder’s decision to buy or sell stock in a publicly traded company utilizing material, nonpublic information (Markon and Schmitt 2002). The law bars trading in a material nonpublic information. In terms of defining just what kind of information fits this category, prosecutors have some leeway. The most clear-cut examples include market-moving news such as an impending merger or bad earnings report before it is made public. But, gray areas abound. Numerous other issues abound. For example, many companies attend professional conferences each year and they may provide information about new products to attendees, while at the same time bar members of the general public from any of the above information (Business Week, April 26, 2002). The American Society of Oncology (ASCO) is a case in point. At each of their annual conferences a great deal of information is released to those attending these gatherings. This is akin to insider trading if the attendees begin trading on the information provided to them.

Legal Insider Trading: Insiders need to follow certain procedures when they wish to sell some or all of their holdings. First, the potential inside trader needs to consult with legal consul so as to determine the

17

appropriateness of an insider purchase and/or sale at a given point in time such as a pending merger. Then a Form 144 must be filed with the Securities Exchange Commission (SEC) indicating the number of as well as the precise timing of the desired sale. Finally, an opinion letter must be sent from the appropriate legal counsel and filed along with the above, to the Securities Exchange Commission (SEC). All these procedures are meant to ensure that the corporate insiders do not trade on or tip others with insider information thus negatively affecting the company and/or its shareholders.

Thus, although both Section 16b and Rule 10b-5 address the problem of insider trading and both apply to the same transaction (i.e., trading securities), yet these two legal sources differ in many aspects: 1) Section 16b applies only to transactions involving registered equity securities, whereas Rule 10b-5 applies to all securities. 2) The insiders by Section 16b are only directors, officers, and those who own more than 10% of the a company’s stock, while the insiders by Rule 15b-5 extends to other categories such as agents of the security issuer, underwriters, accountant, lawyers and consultants. 3) Section 16b does not require that the insider possess material, nonpublic information; the liability is strict; whereas Rule 10b-5 applies to insider trading only where such information is not disclosed. 4) Section 16b applies only to transactions occurring within six months of each other, while Rule 10b-5 has no such limitation. 5) Under Section 16b, although shareholders may bring suit, any recovery of damages is on behalf of the corporation; but under Rule 10b-5, injured investors may recover damages on their own behalf (Mann and Roberts 2000, p. 962).

In 1988, the US Congress amended the 1934 Act by adding Section 20A that imposes express civil liability upon any person who violates the Act by purchasing or selling a security while in possession of material, nonpublic information. Any person who contemporaneously sold or purchased securities of the same class as those improperly traded may bring a private action against the improper traders to recover damages for the violation. The action must be filed within five years after the date of the last transaction that is the subject of the violation. Tippers are jointly and severally liable with tippees who commit a violation by trading on the insider information (Mann and Roberts 2000, p. 963).

Further, any person who distributes a materially false or misleading proxy statement may be liable to a shareholder who relies upon the statement in purchasing or selling a security and thereby suffers a loss. A misstatement or omission is material if there is a substantial likelihood that a reasonable shareholder would consider it important in deciding how to vote or buy/sell shares, even if this misstatement or omission occurred merely through negligence. Similarly, by Section 14e of the SEC Act of 1934, it is unlawful for any person to make any untrue statement of material fact, to omit to state any material fact, or to engage in any fraudulent, deceptive or manipulative practices in connection with any tender offer. This provision applies even if the target company is not subject to the 1934 Act’s reporting requirements. Some courts maintain civil liability for violations of Section 14e; however, the requirements for such an action are not entirely clear because relatively few cases have involved such violations. At present, the target company may seek an injunction, and a shareholder of the target company may be able to recover damages or obtain rescission (Mann and Roberts 2000, p. 963).

By legislations enacted in 1984 and 1988, the SEC is authorized to bring an action in a U. S. district court to have a civil penalty imposed upon: 1) any person who purchases or sells securities while in possession of material, nonpublic information; 2) any person who by communicating material, nonpublic information aids and abets another in committing such a violation; 3) any person who directly or indirectly controlled a person who ultimately committed a violation, even though the controlling person knew or recklessly disregarded the fact that the controlled person was likely to commit a violation and consequently failed to take appropriate steps to prevent the transgression. Violation in all three cases must be on or through the facilities of a national security exchange or from a broker or dealer. Purchases that are part of a public offering by an issuer of securities are not subject to this provision (Mann and Roberts 2000, p. 963).

18

Corporate insiders for some time have been forbidden to trade while knowing about material, nonpublic information such as earnings announcements or a possible merger. Currently, insiders need only be aware of confidential market-moving information, as based on SEC Rule 10b-5. A second rule (105b-2) extends liability for illegal insider trading to family members and other non-business relationships that have agreed to keep secret the information they receive.

Further, as of August 2002, SEC has come up with newer rules requiring firms to report trades of company stock by officers, directors and majority shareholders within two (2) days (Kristof 2002). This is a vast improvement over past sales that allowed companies at least 10 days - and sometimes more than a year - to reveal whether the top officers within the firm were buying or selling their equity or portions thereof. Recently, the SEC is involved with more activities relative to insider trading cases: as a result, 57 insider trading related cases were filed in 1996, up from 38 in 1990 (Bryan-Low 2000).

Some Recent US Insider Trading Irregularities (See Fortune, September 2, 2002).

Qwest Communications: As part of BellSouth’s deal to buy some of Qwest, Phil Anschutz, Director of Qwest, sold his stock to BellSouth at $47.25 when its market price was $39.44: his haul was $1.57 billion.

Gateway: Tedd Waitt, founder and CEO of Gateway, spent $9.36 million in June to buy back 2 million Gateway trading around $4, when $82.5 was the stock peak price in November 1999: his haul was $1.00 billion.

Ariba.com: With an unusually short post-IPO lockup period, several corporate executives of Ariba.com began selling their stock barely 4 months after Ariba went public in June 1999. Ron DeSantis, former EVP made 222 million, Keith Krach, Chairman hauled 191 million, Paul Heagarty, Director, Edward Kinsley, former CFO, each laundered 127 million and 114 million, respectively.

I2Technologies: Founder, chairman and CEO of I2 Technologies, Sanjiv Siddhu, who still owns 27% of the company, sold most of these shares after the stock peaked at $110 in March 2000. I2 Technologies stock now trades at less than $1.0; his catch was 447 million; Ramesh Wadhwani, Vice-Chairman, and Sandeep Tungare, former Director each did the same and made 160 million and 140 million, respectively.

Enron: Enron’s Lou Pai, former Division Head, Ken Lay, former CEO, Rebecca Mark, former Division Head and Ken Rice, former Division Head, each cashed stock to mint 270 million, 108 million, 80 million and 74 million dollars respectively; Jeff Skilling and Andy Fastow cashed $68 million each worth of Enron stock, respectively.

Global Crossings: Gary Winnick, Chairman, Global Crossings, cashed stock worth $508 million; Winnick also sold another $227 before January 1, 1999.

Cisco Systems: John Chambers, President, CEO, Cisco Systems, and Judith Estrin, former CIO, each cashed stock to gain $239 million and $ 72 million respectively in 2000. Estrin also cashed $61 million of stock in February 2000, a month before it peaked at $80.06; she left Cisco that April.

Nextel Communications: Craig McCaw, Director, Nextel Communications, cashed stock to the tune of $343 million in 2000. He also cashed $115 million from XO Communications, the Telecom he founded that went belly-up June 2001.

Juniper Networks: Last May, with stock down 96% from its high of $243, executives of Juniper Networks, Scott Kriens, Chairman, CEO, Pradeep Sindhu, Vice-chairman, and Peter Wexler, VP exchanged their booming options for ones priced at $10.31! They bagged each 148 million, 108 million and 87 million dollars, respectively.

19

Opportunism is rampant in every area of business, and corporate finance is no exception as the long list of corporate securities irregularities (e.g., Fortune September 2, 2002) demonstrates. The risk of opportunism can be very high, and considerable resources might have to be spent in controlling and monitoring it, resources that could have deployed more productively elsewhere in the company. Opportunism is hard to detect owing to information asymmetry between the party engaging in opportunistic behavior and the other exchange partner, even harder to control, and strategies for suppressing opportunistic behavior may undermine existing exchange relationships (Murry and Heide 1998) as well as forfeit valuable deals in the process. While several strategies of “external” control of opportunism have been devised, tried, and often failed (e.g. reduction of information asymmetry, closer monitoring, higher monetary incentives to discourage opportunism, higher contracted penalties for opportunistic behavior), very few “internal” control mechanisms have been tried. A major “internal” control such as selecting, contracting, and rewarding marketing or securities managers whose virtues of honesty, prudence, commitment, and fiduciary responsibility have been tested and proven may help control opportunism far more effectively than external monitors.

Corporate irregularities are bred by corporate greed that in turn is stimulated by the corporate “virtue” of selfishness (Rand 1964). What we need at this juncture is a real return to virtue, specifically the virtue of caring for others, specifically advocated by recent feminist ethical scholars (see Gilligan 1982; Noddings 1984). Unless corporate executives “aim higher” (see Bollier 1997), and incorporate virtue in their corporate strategies (see Morris 1997), they will never appreciate the “social contracts” they have implicitly signed with society by their corporate position (Donaldson and Dunfee 1995, 1999).

How do we Combat Corporate Fraud?

Our main argument is that ethics can combat corruption. Additionally, we believe that excessive regulation and its complex interpretation/enforcement process breeds corruption. We also theorize that there is a supply side versus demand side of corruption, especially in India.

However, how and under what circumstances can ethics reduce corruption? We suggest two approaches:

1. Much of corruption thrives on uncertainty or ambiguity of the law, licenses, and other excessive regulation and its enforcement mechanism. There is much information asymmetry between the buyer and the seller of excessive regulation services. Ethics should focus on reducing uncertainty, ambiguity and asymmetry in the entire corruption phenomenon wherever it occurs.

2. In order to do this, we breakdown the phenomenon of corruption into inputs, process, and outputs, and distinguish the supply side and demand side under each. For a proper focus, we concentrate only on the government as the supply side and business house as the demand side – G2B domain.

Other things being equal, uncertainty/asymmetry in relation to inputs may be regarded as complexity, uncertainty in the process may be construed as ambiguity, and uncertainty in the outputs as risk – all this both on the supply side and demand side. Table 2.5 is a representation of uncertainty involved in the sources and sub-sources of corruption. When specifically applied to each cell, ethics can piecemeal combat corruption. Additionally, Appendix 2.3 presents the essentials of the famed USA’s Sarbanes-Oxley Act of 2002 to Combat Corporate Frauds. [See Business Executive Exercises 2.4 to 2.8].

All businesses have a responsibility to the common good. Because corporate executives and

organizations are both economic and social institutional forces, their responsibilities to the public are large and go beyond the sanctions of law and demands of competition. In serving each other, they must

20

strike at some unity that goes beyond a mere melding of self-interests to sharing of socially responsible values and ideals. Howsoever defined, the social good of investors is very high, and the investing public recognizes this good. Corporate irregularities of whatever form reduce this potential for social good by depriving investors of necessary, objective and timely securities information to which they are entitled. This goal is achieved in USA through existing organizations such as GAO, SEC, DOJ, and CFTC.

It is possible that corporate executives would justify their improper action under the guise of situationism. The latter affirms that when confronted with conflicting rights or duties, it is usual to let the situation with all its circumstances define whose rights should prevail. But this does not mean that the rights of shareholders, investors, employees with 401K moneys invested in the company, and other stakeholders should be totally disregarded, as seems to be the case with the corporate irregularities. In fact, moralists (e.g., Rawls 1971) prescribe that under situationism one is obliged to give additional protection to the rights of the disadvantaged.

Concluding Remarks

There are three dimensions to any corporate fraud: the human, the technology, and the legal dimension. The most important one is the human. People will always try to find ways to get around any regulatory system if it is to their advantage to do so. Any legal or technology system is only as good as people that designed it. Consequently, there will always be someone smarter and more knowledgeable that is willing to take the risk of exploiting the system for one’s own benefit.

There are several issues that make it difficult to predict, uncover or control corporate corruption and fraud. When the top-level business executives are corrupt, it is difficult for the mid-level managers to detect or uncover the deceptive acts and the problems underlying them. Moreover, the mid-managers would be worried about their jobs, especially if whistle blowing is punished in corporations. Additionally, corporate executives involved in fraudulent activities that could launder billions of unearned personal profit to them would not hesitate to pressurize and bribe subordinates into silence even if the latter detected something irregular. Some subordinated could be could be easily seduced to keep quiet "for the good of the company" or "only until the mess is straightened out." A sense of personal loyalty may deter some from resigning their jobs under such strenuous situations.

As managers move from one place to another, it is possible they inherit an already messy business from a previous executive, and would be reluctant to expose the situation for any number of personal or professional reasons. Thus, many instances internal audits do not work and are just another form of unnecessary nuisance in the bureaucracy. The Enron bankruptcy raised questions about the validity of the independent audits and of the business practices of the accounting industry itself. It is clear that the auditors failed to pinpoint the problems with companies involved in corporate scams. The accounting practices are relatively simple. It is just hard to believe how easy it was for the accounting firms to disguise the truth, without resorting to collusion between the audits and accounting branches of the implicated firms as an explanation. It is just hard to believe that the accountants would miss the magnitude of these frauds. Clearly, the Enron executives did not abide by the usual accounting principles and rules.

There were systems level failures at several points that allowed many corporate frauds and scams to remain undetected until they were so large and unredeemable. Some of the biggest accounting firms such as Arthur Anderson, Deloitte & Touché, Ernst & Young, KPMG, and PriceWaterhouse Coopers increased their earnings by offering consulting services to the same companies they audited. These firms clearly compromised their credibility and independence when they had to audit their own work. The Securities and Exchange Commission failed to bar accountants from also being consultants for the same

21

company due to extensive pressure from the accounting lobbying groups. The same groups have contributed millions of dollars to individuals, PAC's, and soft money contributions to fight any SEC rules change.

Whatever may be the underlying motivation for corporate scams, what we advocate is a corporate ethical culture that is guided by some teleological rules and deontological imperatives. Some of these have clear managerial implications, such as:

1. Corporate or personal good should not take primacy over social good of the stakeholders.2. A corporate strategy should gratify the maximum number of people affected by that strategy (Rule

Hedonism).3. The total sum of utilities generated by any strategy should exceed that of any comparable

alternative strategy (Rule Utilitarianism).4. A corporate strategy should seek the happiness of the maximum number of people affected by that

strategy (Rule Eudemonism).5. A corporate strategy should result in an action that can be the norm for all persons in such

situations (Rule Formalism: Universalizability).6. A corporate strategy should result in an action that must be based on reasons that one would be

willing to have all others use to judge that corporation’s strategy (Rule Formalism: Reversibility).7. A corporate strategy should fulfill the implied contractual duty to protect the rights and duties of all

stakeholders affected by that strategy (Rawls Contractualism). 8. A corporate strategy should fulfill the implied macro social contractual duty to protect the rights

and duties of all stakeholders affected by that strategy (Integrated Social Contracts Theory). 9. A corporate strategy must observe all legitimate laws that bind (Rule Legalism).

Subsequent handouts will clarify and discuss these rules in greater detail. Any corporate strategy that fulfills one or more of these nine rules has lesser likelihood of corrupting into a corporate scam or indulging in the corporate “virtue” of selfishness (Rand, 1964). What we need at this juncture is a real pursuit of virtue, specifically the virtue of caring for others (see Gilligan 1982; Noddings 1984), and a keen sense of corporate social responsibility (Mascarenhas 1995). Unless corporate executives “aim higher” (Bollier 1997), and incorporate virtue in their corporate strategies (see Morris, 1997), they will never appreciate the “social contracts” they have implicitly signed with society by their corporate position and mission (Donaldson & Dunfee 1995, 1999).

22

Table 2.1: Characterizing Physical Transactional Abuses

Physical Transactio

n Abuse

Level of Ambiguity

Inputs Process Outputs Remarks

Compelling physical non-violent persuasions

Ambiguously Fair

All transparent products and services

Perfect information; full awareness and motivation to act; no physical inducements other than puffery and persuasions

Compelling but fair trade with mutual gain. There is much scope for marketing here.

A Win-Win bilateral exchange in the standard microeconomic sense

Con Game Inherently Ambiguous with social consent

High information asymmetry; the thief commands but the victim plays along.

The victim’s response to the evidence is not simply to misread it but go along with it.

Con Game: the victim plays along, but suffers loss without knowing it.

Personal fraud and scam one gets involved in consciously or unconsciously.

Skimming, Pilfering

Ambiguously unfair

Belief you are not noticed

Every day theft of small items from the organization

Could add up to sizeable amount over many and frequent occurrences

Often, occult compensation for one’s low wages

Theft by Stealth Unambiguously Unfair and One-sided

One-sided intervention to theft. The victim is unaware or absent.

The victim is physically absent or psychologically unaware of the action of the thief.

Theft by stealth: the victim suffers loss without knowing it.

Thief is cunning, contriving, stalking, scheming, and vigilant for the right occasion to steal.

Theft by Fraud Inherently Ambiguous with no consent

High information asymmetry; the thief commands.

The action is noticed but misinterpreted. Pure embezzlement.

Theft by Fraud: The victim suffers loss by misreading evidence.

Corporate fraud, corruption and bribery are here under various forms.

Theft by Force Unambiguously Unfair

Force, physical or mental or psychological; threatening and intimidating elements; high information asymmetry;

Coercion is the only reason why transaction occurs; parties no longer Pareto informed; the victim is physically deterred from responding.Pure robbery.

Theft by force. Transaction for the thief; loss for the others. No marketing needed here, other than bullying and coercing to give in.

The thief knows more than others in the forced transaction. The felon’s overwhelming superiority of power accounts for the victim’s cooperation.

Larceny Unambiguously Unfair

Larceny is felonious stealing using tricks, frauds, chicanery, obfuscation, and the like.

It is taking and carrying, leading, riding, or driving way another person’s personal property.

Larceny is a cunning way of taking goods against the will or consent of the owner but with a felonious intent.

It is a transaction with minimal consent from the victim, who may be silent and non-resistant out of fear of attack. Fraud is a subset of larceny.

23

24

Table 2.2: Characterizing Non-Physical Transactional Abuses

Type of Verbal Abuse

Level of Ambiguit

y

Inputs Process Outputs Remarks

Promotional Persuasion

Ambiguity is moderate

Pre-existing consensus. The value of the transaction can be established within it.

It works within the logic of the prevailing consensus, and defines no new symbols or signs.

Persuasion results given enough prior consensus between buyer and seller.

Most advertising is persuasive in this sense. PR is also persuasive when you fit news material into a prior consensus.

Trickery Ambiguity is moderately high

No pre-existing social buyer-seller consensus.

Implies the use of tricks or ruses in deceiving others.

You unconsciously capitulate to the wiles of advertising

Is a con game in disguise where the victim is drawn into a social consensus

Chicanery Ambiguity is high

No pre-existing social buyer-seller consensus.

Implies the use of petty trickery and subterfuge, especially, in legal actions.

You are charmed by glossy brochures;

Is a con game in disguise where the victim is drawn into a social consensus

Beguile Ambiguity is very high

No pre-existing social buyer-seller consensus.

To mislead people by one’s charm or persuasion of cheating or tricking.

You unconsciously capitulate to the freebies and charms that come inside cartons.

Is a con game in disguise where the victim is drawn into a social consensus

Seduction Ambiguity is highest

Involves construction of a new consensus, a deliberate and stepwise process.

It is a strategy whereby consumers are induced to tolerate or overlook unsustainability, or deny it. In this sense, seduction is more voluntary than fraud and more collaborative than entertainment - a playful game form

Enticement of a consumer into an exchange where ambiguity is resolved by a private social consensus that the consumer plays a part in constructing.

The consumer must be moved in stages from old agreements to new.

Deception Ambiguity is moderately high

Involves construction of a new consensus, a deliberate and stepwise process.

Consumers are influenced by non-substantial attributes and features of a product or service.

Deception in when consumers change their behavior for reasons not objective but on beliefs and impressions made on them by promotions.

Often, consumers are influenced by non-substantial s of a product at the expense of disregarding its intrinsic aspects (Gardner 1975).

Cheating Ambiguity is high for trickery + deception

No pre-existing social buyer-seller consensus.

Cheating is often fraudulent and dishonest exchanges

Cheating is trickery + deception towards one’s clients

Consumers, customers, clients and buyers get often tricked via ambiguous marketing promotions.

25

26

Table 2.3: Commonest Frauds by Type, Perpetrators, Methods, Victims, and Costs of Deception

Type of Fraud

Fraud Perpetrators

Method of Deception

Victims of Deception

Costs of Deception

Management Fraud

Top executives such as CEO, CFO and chief accounting officer (CAO)

Creative and aggressive accounting such as earnings management;Income smoothingGain on sale andWash trading

Organization,Investors,Employees,Suppliers,CustomersShareholders,Creditors or lenders

Loss of market valuation, Tobin’s Q, brand equity, supplier goodwill and customer loyalty and investment opportunity; loss of earnings, share price, and corporate imagePossible bankruptcyLoss in financial performance ratios such as P/E, EPS, ROIC, RONA, ROI, ROE & total shareholder return (TSR)

Securities Fraud

Top executives with insider information

Illegal insider trading

Public investors who do not have access to inside information

All of the above, plus violation of insider trading laws with litigation losses

Investment Scams

Any individual involved in such scams

Tricking or conning into worthless investmentsTelemarketing fraud

Unsuspecting investors, especially the elderly, teenagers, the marginalized

False prizes/sweepstakesUnnecessary magazine salesWorthless buyer club feesUnrealized advance fee-loansWork-at-home schemesDeceptive travel/vacation packages

Tax Fraud Corporate and non-corporate tax evaders

Failure to report income from fraud or bribes; filing false returns

IRS State and local tax authorities

Violation of Title 26, US Code # 7201Bribes may not lawfully be deducted as business expensesLoss of tax money to governments

Racketeering RacketeersCorrupt organizations

Criminal violations of commercial exchange laws and ordinances;Money laundering

Commercial exchange partners affected by racketeering

Racketeer influenced and Corrupt Organizations (RICO) statue violated; Title 18, US Code # 1961

Vendor Fraud VendorsSuppliersBrokersDistributorsRetailers

Significant over-charging either singly or by collusionNon-shipment of goods paid for

Government with defense contracts;Innocent corporations and customers

Shipment of inferior or fake goodsOvercharge for purchased goodsDeprivation of goods paid forCounterfeit goods

Employee fraud or embezzlement

EmployeesAt all non-executive levels

Skimming, theft;Cheating on time, money, quality of work

Employers,Shareholders,Customers,Other employees

Losses in cash, kind, morale, work-efficiency, sales and performance due to occupational fraud

Computer Fraud

Computer hackers, code-breakers, andclassified data destroyers

Illegal access to a protected computer vaulting or classified data; hacking

The public, defense, national security and all governments affected by classified data

Violates Title 18, US Code # 1030

Bribery and Kickbacks

All those engaged in bribery, kickbacks, and foreign corrupt practices

Bribery & kickbacks; strategies

SuppliersPrime contractors of government projects

Bribery violates Title 18, US Code # 201, and the Foreign Corrupt Practices ACT (FCPA), Title 15, US Code # 78.Kickbacks violate Title 41, US Code #s 51-58.

Customer Fraud

Some customersSome borrowersAngered customers getting

Not paying for goods purchased; getting something for nothing; conning

The vendorsRetailersBanks tricked into granting loans or

Consumer theft costsBad debts; consumer credit abuse;Violated loan covenantsFree rider costs; Unpaid interest

27

even with employers

banks to make loans or transfer funds

funds transfers Non-amortized capital

28

Table 2.4: A Taxonomy of Occupational Fraud and Abuse[See Wells (2004:46)].

Fraud Action

Major Types

Sub-types

Corruption as Abuse

Conflict of Interest

Purchase schemes

Sales schemes Joint venture schemes

Strategic alliance schemes

Other

Bribery Invoice kickbacks

Bid rigging Concealed perks Family favors

Other

Illegal gratuities

To self To subjects To other groups Gratuities in kind

Gratuities in stocks

Economic extortion

Purchase undercharges

Sales surcharges

Extorting commissions

DistortingSales

performance

Other

AssetMisappro-priation as

Fraud

Cash related

Larceny Of cash on hand

From the deposit From marketable securities

Other

FraudulentDisbursements

Billing schemes

Shell company Non-accomplice

vendor

Personal purchases

Payroll schemes;

falsified wages

Ghost employees Commission schemes

Workers compensation

Expense reimbursemen

tschemes

Mischaracterizing expenses

Overstate expenses

Fictitious expenses; multiple

reimbursements

Check tampering

Forged maker or endorsement

Altered payee

Concealed checks

Register disbursements

False voids False refunds

Other

Skimming

Sales Unrecorded Understated

Other

Receivables Write-off schemes

Lapping schemes

Unconcealed

Refunds Used returns Tampered returns

Stolen returns

Inventory & All Other Assets

Misuse Misuse of inventories

Misuse of payables

Misuse of receivables

Misuse of other liquid assets

LarcenyAsset

requisitions and transfers

False sales & shipping

Purchasing & receiving

Unconcealed larceny

Fraudulent

Statements

Financial

Asset/revenueOverstatements

Timing differences

Fictitious revenues

Concealed liabilities &

expenses

Improper disclosures;

improper asset valuations

Asset/revenueUnderstatement

s

To make lean years look

good

To provide for future leaner

years

To jeopardize

budgets

Other harms

Non-financial

Employment credentials

Fudging Internal

documents

Doctoring External

documents

Overstating credentials

Understating credentials

29

Table 2.5: The Supply and Demand Side of Fraud and Corruption: An Input, Process and Output Analysis

Source of Corruptio

n

Sub-Source of Corruptio

n

Structure of CorruptionStructured Inputs

to Corruption: Complex People and Instruments

Structured Processes of Corruption: Ambiguous

Exchange Situations

Structured Outputs of Corruption: Risk

Consequences

G2BSupply

Side(Laws &

Governments)

Corrupt People

Corrupt G2B politicians;Corrupt G2B government officials;Ministers with key G2B portfolios;Unfair G2B lawyers and judges

G2B information asymmetry;G2B Opaque transactions;G2B Obfuscation and chicanery;G2B subtle bribery demand;

Information asymmetry products;G2B Seduction and Deception;GEB Blackmail and beguile set-up;G2B Structured deception;G2B Excessive bribery or robbery;

Corrupt Instruments

or Means

Excessive industry/market regulation;Complicated industry excise/tax haven laws;Complex mining licensing systems;Complex Public bidding tenders;

Overbearing G2B bureaucracy;Ambiguous law interpretation;Many G2B authorization requirements;Ambiguous G2B bid process/selection;

Government market opacity;Structured market injustices;Loss to the government ex-checker;Lost business opportunities;Tax Losses – govt. deficit budgets;Consequent loss in GDP growth;

B2GDemand

Corrupt People

Unethical/immoral executives;Overbearing middle managers;Unscrupulous accountants;Corrupt internal auditors;Corrupt external auditors;

Tax evasion; bribery-proneness;Export duty violation;Import-quota violation;Over-Maximizing profits;Low ethical and moral thinking;

Loss in taxes to the exchequer;Loss in bribery payments to the industry;Loss in market capitalization;Loss in brand image and equity;

30

Side(Business Houses)

Corrupt Instruments

or Means

Corrupt B2G distribution and retail managers;Corrupt B2G supply chain managers;Banking and credit opaque B2G instruments;Financial analyst (e.g., BSE) pressurized demand;Institutional Shareholder demands;Customer demands/complaints;

Bribing government distributors and retailers;Bribing or pressurizing G2B suppliers;Bribing and buying G2B bank credit;Deceiving financial analyst by fraud;Silencing institutional shareholders by promises;Buying business licenses and project approvals via B2G bribes;

Weakened B2G creativity;Delayed R&D and innovation owing to corrupt B2G deals;Stalled and stagnant business;Losses due to G2B and B2G delays;Loss in sustainable competitive advantage (SCA) to governments and businesses;Consequent loss in market share;Loss in RE & corporate growth for the nation and industries;Loss in GDP, EBIT, EPS, ROI;

31

Turnaround Executive Exercises

2.1 In understanding and investigating the nature of corporate fraud and its related crimes in your company, discuss the following:

a) What is fraud? What are its essential legal elements?b) What is occupational fraud? How is it different from corporate fraud?c) What is corporate fraud? What are its legally constitutive elements?d) What is corporate abuse? What are its basic elements?e) How is corporate fraud different from corporate abuse?f) How is fraud different from deception?g) How is fraud different from misleading?h) How is fraud different from deliberate misrepresentation?i) How is fraud different from unintentional errors?j) How is fraud different from trickery?k) How is fraud different from chicanery?l) How is fraud different from larceny?m) How is fraud different from robbery?n) How is fraud different from embezzlement?o) How is fraud different from stealing?p) How is fraud different from skimming?

2.2 Investigate the following corporate frauds and estimate their impact in relation to: a) corporate cash flow crisis, b) employee jobs and pensions, c) company stock prices, and d) social economic loss.

a) During 1998-2000, Andrew Fastow, CFO at Enron, negotiated and set up outside partnerships to conduct Enron business. As the principal in these partnerships, however, Fastow also negotiated with Enron on behalf of the partnerships.

b) During 1999-2001, Qwest Communications inflated revenue using network capacity “swaps” with Enron and improper securities for long-term deals.

c) During 2001-2002, AOL inflated sales by booking barter deals and ads it sold on behalf of others as revenue to keep its growth rate up and seal the deal. AOL also boosted sales via “round-trip” deals with advertisers and suppliers.

d) In 2002, Phil Anschutz, Director of Qwest, sold his stock to BellSouth at $47.25 when its market price was $39.44: his haul was $1.57 billion.

e) In February 2002, World Crossings engaged in network capacity “swaps” with other carriers to inflate revenue.

f) In February 2002, Global Crossings engaged in similar network capacity “swaps” with other carriers to inflate revenue. It also shredded documents related to securities practices.

g) In March 2002, WorldCom booked $3.8 billion in operating expenses as capital expenses.h) In March 2002, WorldCom gave founder, Bernard Ebbers, $400 million in off-the-book loans.

2.3 Examine the following employee occupational abuses. In what way are they different from fraud? How are they different from corrupt practices? How are they different from crimes? How are they economically harmful to the employer? How are they morally harmful to the employees? How are they socially harmful to the economy, society and the nation? What employee’s fiduciary duties to the organization do they violate? How do they violate employee’s moral duties of honesty and self-esteem to themselves?

a) Use sick leave when not sick.b) Come to work late or leave work early.c) Take a long lunch or break without approval.d) Indulge in slow and sloppy work.e) Declare or punch more hours than worked for and be paid.

32

f) Work under the influence of alcohol or drugs.g) Take products or stationery belonging to the organization (pilferage).h) Pad your expense accounts. That is, collect more money than due on business expense reimbursements.i) Use employee discounts to purchase goods for relatives or friends.

2.4 Consider the following case of accounts receivable fraud. The bookkeeper of a small but growing bread company prepared bills to be sent to customers and was responsible for collecting payments. Recently, sales have been increasing because of new customers and augmented sales revenue from existing customers. A surprise internal audit, however, revealed that bank deposits were not growing proportionately to the increasing sales revenues. On examining the customer copies of sales invoices, a fraud examiner found that the amounts being billed were higher than the amounts being recorded in the cash receipts journal for the same transaction. Office copies of the invoices had been altered to reflect the falsified journal entry. The bookkeeper had stolen over $15,000 before the fraud was discovered. The bookkeeper was dismissed. He agreed to pay back $15,000, however, lest he should be prosecuted (see Silverstone and Sheetz 2007: 28).

a) How do you classify this fraud?b) Which of the five traditional accounting cycles is its source?c) How do you identify exceptional and questionable account balances and variations?d) Also, how could you detect it much earlier before the damage it created?e) Which fundamental rule of accounting does this fraud violate, and why?f) Hence, how would you prevent such frauds in the future?

2.5 Consider the following case of accounts payables fraud. An administrator of a school board in a small city had full authority for all items payable from the board’s annual budget. As an administrator, he traveled frequently to education conventions and meetings of administrators in the state capitol and across the country. An excellent CPA but a non-pleasant personality, he was not endeared to the board, and the board was slow in approving his travel budgets. Frustrated and embittered, the administrator used his own signing authority to approve personal expenditures and write checks to himself. He started padding the expense accounts. For instance, he would charge mileage when using company’s leased car. He used the board’s credit card to fill gas in his own private car. He submitted and approved several bills regarding meals and entertainment on weekends and repairs to his car. His secretary blew the whistle on him, and forensic fraud examiners found that invoices for many transactions did not exist. He was dismissed from the job, but no specific charges were laid against him (see Silverstone and Sheetz 2007: 30).

a) How do you classify this fraud?b) Which of the five traditional accounting cycles is its source?c) Hence, how could you detect it much earlier before the damage it created?d) How do you identify exceptional and questionable transactions?e) Which fundamental rule of accounting does this fraud violate, and why?f) Hence, how would you prevent such frauds in the future?

2.6 Consider the following case of payroll fraud. A suburban construction company employed several hundred laborers at any given time. For an efficient lean operation management, the home-office included a one-person accounting department, with a long-serving bookkeeper/controller who coordinated the weekly payroll, printed the payroll checks, signed the checks with the owner’s stamp, and hand-delivered the checks to the job sites, and reconciled the company’s bank account. Owing to lack of any checks and balances, the payroll clerk continued paying checks to several laborers long after they were gone, i.e., to ghost employees. He would endorse the checks and deposit them in his own account. At the same time, he paid the withholding taxes, union dues, and other deductions at source. An alert bank teller eventually noticed the fraud, but only after several years and when the clerk had taken over $600,000 (see Silverstone and Sheetz 2007: 31).

a) How do you classify this fraud?

33

b) Which of the five traditional accounting cycles is its source?c) Hence, how could you detect it much earlier before the damage it created?d) How do you identify exceptional and questionable transactions?e) Which fundamental rule of accounting does this fraud violate, and why?f) Hence, how would you prevent such frauds in the future?

2.7 Consider the following case of inventory fraud. Suspecting some flow play, the board of directors of a gold refiner company hired some forensic investigators to check the inventory of gold in the company. The investigators discovered several brass bars of exactly the same weight as a gold bar on the inventory. An interview with a smelter worker revealed that brass scrap had been melted down, cast into bars and added to the inventory. There was no record of brass bars, however, on the inventory list. Instead, forty-five bars had been valued at $8 million on the balance sheet. Another $5 million was classified as gold bars “in transit.” The fraud had been going on for five years when it was discovered. On further investigation, it was found that the CEO had perpetrated the crime together with his VP of Finance, in an attempt to hide operating losses that would have jeopardized their positions and depressed the stock value of the company. The CEO and the VP of Finance were both charged with fraud, convicted, and served a prison sentence (see Silverstone and Sheetz 2007: 32-33).

a) How do you classify this fraud?b) Which of the five traditional accounting cycles is its source?c) Hence, how could you detect it much earlier before the damage it created?d) How do you identify exceptional and questionable inventory evaluations?e) Which fundamental rule of accounting does this fraud violate, and why?f) Hence, how would you prevent such frauds in the future?

2.8 Consider the following case of capital expenditures fraud. By law, mortgage brokers are limited in their business activities to specific mortgages, and investors to invest in them. For example, an investor would give the broker $50,000 to be invested in a particular mortgage at the prevailing rate per annum to be paid monthly. Often, certain brokers would violate their investment limits and issue other money instruments. A government agency responsible for overseeing mortgage brokers was concerned that many brokers were borrowing and lending money as if they were licensed as banks or trust companies. The agency hired some forensic investigators to examine the books of a randomly selected group of mortgage brokers. The investigators found that one broker had exceeded his authority by issuing so-called corporate notes secured by the company’s guarantee rather than by a mortgage. This broker used the money instead to purchase property for himself, who then reduced his risk by selling partial interests to his family members or other relatives. By the time the forensic investigators discovered this fraud, the broker had taken in more than $5 million by issuing corporate notes and invested in high-risk ventures that failed to pay rates of return required to service the corporate notes. The broker, however, met his monthly obligations to his investors through borrowing on a bank line of credit and was quickly overextended. The government agency revoked the broker’s license, and closed his operations with the help of several banks who took over the mortgages to protect the investors (see Silverstone and Sheetz 2007: 33-34).

a) How do you classify this fraud?b) Which of the five traditional accounting cycles is its source?c) Hence, how could you detect it much earlier before the damage it created?d) How do you identify such exceptional and questionable mortgage transactions?e) Which fundamental rule of accounting does this fraud violate, and why?f) Hence, how would you prevent such frauds in the future?

34

Appendix 2.1: Recent Insider Trading Irregularities[Source: Fortune, September 2, 2002, pp. 64-74].

Company TotalHaul

($Billions)

Biggest Takers Individual Haul

($Millions)

Remarks

QwestCommunications

2,260 Phil Anschutz, Director,Jo Pe Nacchio, former CEO

1,570230

As part of BellSouth’s deal to buy some of Qwest, Anschutz sold his Qwest stock of 33.228 million shares to BellSouth at $47.25 for $1.57 billion when its market price was $39.44.

Broadcom 2,080 Henry Samueli, CIO,Henry Cicholas, CEO,(both co-chairmen)

810799

Nicolas boasts that he pays Broadcom employees so little that they have to sell their stock to pay their bills.

AOL Time Warner

1,790 Steve Case, Chairman,Bob Pitman, former COO,Jim Barksdale, Director

475225213

Ex CEO Gerald Levin, who masterminded the AOL-Time Warner merger, and left it May 2001, did not cash in single share over this period.

Gateway 1,270 Ted Waitt, CEO 1,100 Founder Waitt spent $9.36 million in June to buy back 2 million Gateway stock trading around $4 in June 2002. The stock peaked at $82.5 in November 1999.

Ariba 1,240 Ron DeSantis, former EVP,Keith Krach, Chairman,Paul Heagarty, Director,Edward Kinsley, former CFO

222191127114

With an unusually short post-IPO lockup period, these executives began selling their stock barely 4 months after Ariba went public in June 1999.

JDS Uniphase 1,150 Kevin Kalkhoven, former CEO,Danny Pettit, former CFO,Josef Strauss, CEO & Co-Chair

246206175

“I have made zero sales in 2002.” says Strauss, CEO since May 2000. Today all my options are underwater. I need a submarine to read them.”

I2 Technologies 1,030 Sanjiv Siddhu, Chairman, CEO,Ramesh Wadhwani, Vice-Chairman,Sandeep Tungare, former Director

447

160

144

Founder Siddhu, who still owns 27% of the company, sold most of these shares after the stock peaked at $110 in March 2000. I2 Tech. now trades at less than $1.0.

Sun Microsystems

1,030 Bill Joy, CTO,Ed Zander, former President

103100

Joy sold one million Sun shares in October 2000, 15% of his stake. He sold all his other tech holdings around the same time.

Enron 994 Lou Pai, former Division Head,Ken Lay, former CEO,Rebecca Mark, former Div. Hd.Ken Rice, former Division Head

2701028074

Jeff Skilling and Andy Fastow cashed $68 million each worth of Enron stock, respectively.

Global Crossing 951 Gary Winnick, Chairman 508 Winnick also sold another $227 before January 1, 1999.

Charles Schwab 951 Charles Schwab, Chairman, CEO,David Pottruck, President, CEO

353

188

Schwab’s sales “have never amounted to more than a few percentage points of his total holdings in any one year,” says a spokesperson.

35

Yahoo 901 Tim Koogle, former CEO,Jeff Mallett, former COO,Gary Valenzuela, former CFO

160148116

Co-founders Jerry Yang sold only $30 million during this period, while David Filo sold none.

Cisco Systems 851 John Chambers, President, CEO,Judith Estrin, former CIO

23972

Estrin also cashed $61 million of stock in February 2000, a month before it peaked at $80.06; she left Cisco that April.

Company TotalHaul

($Billions)

Biggest Takers Individual Haul

($Millions)

Remarks

Peregrine Systems

818 John Moores, Chairman 646 Peregrine is restating revenues from April 1999 to December 2001, during which Moores dumped $530 million of stock.

Sycamore Networks

726 Gururaj Deshpande, Chairman,Dan Smith, President, CEO, Director,Chi Kong Shue, EVP

137129

122

BY the time main customer, Williams Communications, went bankrupt last April, these insiders had done most of their selling.

Nextel Communications

615 Craig McCaw, Director,Daniel Akerson, former CEO

343117

McCaw also cashed $115 million from XO Communications, the Telecom he founded that went belly-up June 2001.

Foundry Networks

582 Bobby Johnson, Chairman, CEO

308 We are going to create shareholder wealth the old fashioned way, said Bobby in January 2000. Market cap has since fallen 95%!

Juniper Networks 557 Scott Kriens, Chairman, CEO,Pradeep Sindhu, Vice-chairman,Peter Wexler, VP

14810887

Last May, with stock down 96% from its high of $243, executives exchanged their booming options for ones priced at $10.31!

Infospace 541 Naveen Jain, Chairman, CEO

406 Jain claims he plowed much of this gain into Net stocks; “I lost $80-100 million just on Inktomi and Verisign.”

Commerce One 531 Thomas Gonzales, former CTO,Jay Tenenbaum, former Director

11575

Tenenbaum who got a chunk of Commerce One stock when he sold Vio Systems to the company in January 1999, left last April. Gonzales died last fall.

AT&T 475 John Malone 348 AT&T bought Malone’s company, TCJ, in a stock deal in March 1999. Malone left his post as an AT&T director in 2001.

Network Appliance

470 David Hitz, EVP,Thomas Mendoza, President,Daniel Warmenhoven, CEO, Director

1115848

Hitz says his selling is systematic: “It’s an extremely consistent pattern of about 2.5% of my remaining shares per quarter.”

Inktomi 431 Paul Gauthier, former CTO,David Peterschmidt, Chairman, CEO

10784

Peterschmidt hasn’t sold any Inktomi shares since February 2001. “Investors would flip if they found they did,” says a spokesperson.

Priceline 417 Jay Walker, former Vice-chairman,Timothy Brier, former EVP

27645

Walker bought $125 million of Priceline shares from Delta Airlines in November 1999, before the stock began falling.

36

Vignette 413 Ross Garber, former CEO,Neil Webber, former CTO

9892

Founders Garber and Webber did most of their selling after they left Vignette’s Board in July 1999 and October 1999, respectively.

Totals:No. of Companies:

SumMeanStd. Dev.

25

23, 074923502

Totals:No. of Executives involved:

Sum:Mean per executive:Std. Dev.

55

14,147257262

37

Appendix 2.2: Recent Accounting Irregularities[Source: Fortune, September 2, 2002, pp. 64-74].

Company TotalHaul

($Billions)

Biggest Takers Individual Haul

($Millions)

Remarks

QwestCommunications

2,260 Phil Anschutz, Director,Jo Pe Nacchio, former CEO

1,570230

As part of BellSouth’s deal to buy some of Qwest, Anschutz sold his Qwest stock of 33.228 million shares to BellSouth at $47.25 for $1.57 billion when its market price was $39.44.

Gateway 1,270 Ted Waitt, CEO 1,100 Founder Waitt spent $9.36 million in June to buy back 2 million Gateway stock trading around $4 in June 2002. The stock peaked at $82.5 in November 1999.

Ariba 1,240 Ron DeSantis, former EVP,Keith Krach, Chairman,Paul Heagarty, Director,Edward Kinsley, former CFO

222191127114

With an unusually short post-IPO lockup period, these executives began selling their stock barely 4 months after Ariba went public in June 1999.

I2 Technologies 1,030 Sanjiv Siddhu, Chairman, CEO,Ramesh Wadhwani, Vice-Chairman,Sandeep Tungare, former Director

447

160

144

Founder Siddhu, who still owns 27% of the company, sold most of these shares after the stock peaked at $110 in March 2000. I2 Tech. now trades at less than $1.0.

Sun Microsystems

1,030 Bill Joy, CTO,Ed Zander, former President

103100

Joy sold one million Sun shares in October 2000, 15% of his stake. He sold all his other tech holdings around the same time.

Enron 994 Lou Pai, former Division Head,Ken Lay, former CEO,Rebecca Mark, former Div. Hd.Ken Rice, former Division Head

270

102

80

74

Jeff Skilling and Andy Fastow cashed $68 million each worth of Enron stock, respectively.

Global Crossing

951 Gary Winnick, Chairman 508 Winnick also sold another $227 before January 1, 1999.

Cisco Systems 851 John Chambers, President, CEO,Judith Estrin, former CIO

239

72

Estrin also cashed $61 million of stock in February 2000, a month before it peaked at $80.06; she left Cisco that April.

Sycamore Networks

726 Gururaj Deshpande, Chairman,Dan Smith, President, CEO, Director,Chi Kong Shue, EVP

137

129122

By the time main customer, Williams Communications, went bankrupt last April, these insiders had done most of their selling.

38

Company TotalHaul

($Billions)

Biggest Takers Individual Haul

($Millions)

Remarks

Nextel Communications

615 Craig McCaw, Director,Daniel Akerson, former CEO

343117

McCaw also cashed $115 million from XO Communications, the Telecom he founded that went belly-up June 2001.

Juniper Networks

557 Scott Kriens, Chairman, CEO,Pradeep Sindhu, Vice-chairman,Peter Wexler, VP

148

10887

Last May, with stock down 96% from its high of $243, executives exchanged their booming options for ones priced at $10.31!

Priceline 417 Jay Walker, former Vice-chairman,Timothy Brier, former EVP

276

45

Walker bought $125 million of Priceline shares from Delta Airlines in November 1999, before the stock began falling.

Vignette 413 Ross Garber, former CEO,Neil Webber, former CTO

9892

Founders Garber and Webber did most of their selling after they left Vignette’s Board in July 1999 and October 1999, respectively.

39

Appendix 2.3: The Sarbanes-Oxley Act to Control Corporate Frauds

Hurriedly passed by the U. S. Congress in 2002 in the wake of Enron and other giant corporate scandals of 2000-2002, the Sarbanes-Oxley (SOX) Act 4 seeks to reduce the likelihood of fraud by making public company CEOs and CFOs directly accountable for the internal disclosures and financial statement of their organizations. Senior managers will also be subject to greater oversight from boards that are more independent, internal audit committees and external audits. A major objective of SOX Act was to control and combat corporate fraud by: a) developing better reliable information about company’s operations to avoid making bad decisions, and thus, b) improving the reliability of financial reporting, and c) restoring investor confidence. The ACT went into effect in 2002, and public CEOs and CFOs had to implement it by fiscal year 2004. The SOX, also known as Public Company Accounting Reform and Investor Protection Act of 2002, was intended to provide a proper accounting framework and rules for public companies by improving the accuracy and reliability of corporate financial statements and disclosures made pursuant to the securities laws. The goal of SOX is for internal controls to be so effective that degradation of the system through fraud is virtually impossible (Silverstone and Davis 2005: 23).

SOX seek to prevent and punish corporate corruption. SOX created a Public Company Accounting Oversight Board (PCAOB) whose functions are to register, oversee, investigate and discipline all Public Accounting Firms (PAF) that audit public companies. SOX require the creation of an audit committee comprising of independent directors of the issuer company. The issuer company’s PAF auditor will be under the control of the audit committee. The CEO and the CFO of the issuer company will sign all its official financial statements and disclosures.

Compliances with SOX are enshrined in three brief Sections: 302, 404 and 906.

Section 302 (Title III): Corporate Responsibility for Financial Reports: Section 302 requires that CEOs and CFOs personally certify:

1. The accuracy of financial statements and disclosures in the periodic reports issued by the corporation,

2. That these statements fairly represent in all material aspects the results of operations and financial condition of the company,

3. That the financial controls and procedures of sox have been implemented and evaluated, and 4. Any changes to the system of internal control since the previous quarter will have been

noted.

Section 404 (Title IV – Enhanced Financial Disclosures): Management Assessment of Internal Controls: Reports filed with the SEC must include all material off-balance sheet transactions and relationships that may have material effect on the financial status of an issuer. Additionally, Section 404 requires:

a) An annual statement of the issuer to contain an internal control report which shall state that the management is responsible for establishing and maintaining an adequate internal control structure and procedures for financial reporting;

b) CEOs and CFOs to periodically assess and vouch for their effectiveness, and c) That no loans be extended to senior executives.

4 On June 18, 2002, the Senate Banking Committee passed a bill (#2673), a legislation crafted by Senator Paul Sarbanes (D-MD), mostly in reaction to the confusion and distrust in the US financial markets caused by a series of gigantic corporate scandals involving Enron, Global Crossing, Arthur Anderson etc., in late 2001. The bill was expected to die in the House owing to its draconian implications, but got triggered on June 25, 2002 when WorldCom’s announced overstating earnings in their previous five quarters by over $3.8 billion due to improper accounting procedures. On July 15, 2002, the Senate passed the Sarbanes’ bill by a 97-0 vote. In the House, Michael Oxley (R-OH) made a few significant changes to the bill and sent it to the House floor where it passed almost unanimously. Later, the new version of the bill (now called Sarbanes-Oxley) was passed by the Senate 99-0 and in the House with a 423-3 vote. On July 30, 2002, President Bush signed the Sarbanes-Oxley Act of 2002 as law, describing it as “the most far-reaching reforms of American business since the time of Franklin Delano Roosevelt,” (Whalen 2003).

40

Section 906 (Title IX – White-Collar Crime and Penalty Enhancements): Corporate Responsibility for Financial reports: Section 906 requires CEOs and CFOs to sign and certify the report containing financial statements; they must confirm that the document complies with SEC reporting requirements and fairly represents the company’s financial condition and results. Willful failure to comply with this requirement can result in fines up to $5 million and imprisonment from five to 20 years.

Moreover, Title VIII on Corporate Criminal Fraud and Accountability adds other injunctions:

a) It is a felony for knowingly destroying, concealing or falsifying a document to impede and investigation;

b) All auditors should maintain audit work papers for five years; c) The statute of limitations and securities fraud will be increased to five years; d) Imprisonment for defrauding shareholders will increase to 25 years, and e) All whistleblowers will be protected from management retaliation.

By Section 404, companies are also obliged to include an internal-control report as part of the annual report that should minimally include the following:

a) A statement acknowledging responsibility for establishing and maintaining adequate internal control over financial reporting.

b)A statement identifying and specifying the internal-control framework to evaluate the effectiveness of internal control over financial reporting.

c) An assessment of the company’s internal control over financial reporting as of the end of the most recent fiscal year.

d)Disclosure of any material weakness in the company’s internal control over financial reporting (the latter is deemed ineffective if any material weakness exists).

e) A statement that the independent external auditor has issued a report on the company’s assessment of internal control over financial reporting, and

f) A statement that the company’s external auditor has examined and reported his/her assessment of requirements under (c) and (d) above.

The first step toward SOX compliance is the establishment of an audit committee composed of financially experienced members of the board of directors, who are independent (in the sense, they perform no other corporate duty, receive no compensation other than their directors’ fees). At least one member of the audit committee must be a financial expert (the SEC will judge the level of expertise based on previous responsibilities, education, and experience with internal controls and the preparation of financial statements). The audit committee will not have members with close family ties among directors such that concentration of power in too few hands is avoided. The audit committee is responsible for hiring and compensating both internal and external auditors and any other consultant, and is thus, a logical body to oversee the entire SOX compliance process. Without meddling with everyday company affairs, the audit committee must be able periodically to access all major financial and accounting transactions to identify, monitor and question any unusual transactions and novel practices within the company. [See Turnaround Executive Exercise 2.5].

By Section 406, titled “Code of Ethics for Senior Financial Officers,” corporations must have a Code of Ethics “applicable to its principal financial officer and comptrollers or principal accounting officer, or persons performing similar functions.” That is, the senior management together with the audit committee must devise a Code of Ethics for the company that focuses on:

1. Honest and ethical conduct, including the ethical handling of actual or apparent conflicts of professional and personal interest;

2. Full, fair, accurate, timely and understandable disclosure of relevant matters in the company’s regular filings, and

3. Compliance with applicable government rules and regulations.

41

The Code will also prevent improper insider trading. The senior management must explain the code of ethics to all levels of employees, each of whom should receive a copy. The Code should provide for the segregation of conflicting duties, periodic reconciling of accounts, and have these reconciliations reviewed by someone independent of the reconciliation process. [See Turnaround Executive Exercise 2.6].

Costs and Benefits of Sarbanes-Oxley Act

SOX’s benefits to the investor public are obvious (Yallapragada 2007: 69):

a) It has established an accounting industry watchdog; b) It makes CEOs and CFOs responsible for all official financial statements, their procedures of

internal controls and their contents; c) It mandates the companies and their auditors to assess the effectiveness of internal controls; d) It strengthens the role of the board of directors, and e) It forbids cozy relationships between accountants and executives.

The major problems with the SOX, however, relate to interpreting of and complying with Section 404. Audit fees have skyrocketed – average cost for a midsize company of implementing SOX, especially Section 404, have been over $1 million. The costs may not justify the benefits of compliance. In fact, implementing SOX has been minting money to accounting firms and trial lawyers (Powell 2005). In this regard, SOX particularly hurts smaller and midsize public companies. SOX also places too much burden on CEOs and CFOs who must divert time from business decisions to internal controls and their effectiveness. Hence, many companies have stopped dealing with NYSE and, instead, chosen foreign stock exchanges, especially the London Stock Exchange (Factor 2006). Whereas from the 1990s, when the vast majority of IPOs were made in the US financial markets, since 2002, there has been a steady migration of IPOs to foreign stock exchanges (Murray 2006).

SOX, moreover, has many ethical challenges. Under SOX, if the company is indicted, the CEO and the board must prove they are directly overseeing and monitoring an ongoing comprehensive ethics program that assures SOX compliance throughout the company. SOX also implies that ethical guidance and reinforcement should come from the top management (Galla, Cavico and Mujitaba 2007). Before SOX, business ethics was important; after SOX, it is mandatory. SOX, however, does not provide clear ethical criteria, leaving the responsibility for ethical and moral education within the company to each organization. SOX assumes that ethical behavior can be enjoined by laws and rules, even though conventional thinking on moral development (e.g., Kohlberg 1969, 1984; Rest and Narvaez 1994) believes that people develop ethical behavior in response to social norms and organizational ethical climate in the environment they work and live, and not from rules. The corporate frauds that plagued the companies were not because existing laws and rules were inadequate. Corporate frauds were executive ethical failures. Corporate executives with their concern for demonstrating high financial performance to shareholders and Wall Street analysts devised creative accounting practices with the collaboration of their accountants, and hence, set a tone for unethical behavior (Verschoor 2004). Can SOX change this unethical behavior through mere rules and penalties?

In 2006, year two of implementing SOX, many companies are still struggling setting effective internal control systems that CEOs, CFOs, and the independent and external auditors can assess and vouch for (Wagner and Ditmar 2006). In this regard, the Public Company Accounting Oversight Board (PCAOB) has come up with various rules, standards, and elaborations that may help companies with SOX compliance. If a company, however, can demonstrate a strong control environment, then it can reduce the overall scope of its internal-control evaluation, reduce in the sense that the company need not carry out as many internal tests and the auditors may do less corroborating, resulting in lower compliance costs.

42